CVE-2016-8582
📋 TL;DR
This vulnerability allows unauthenticated attackers to execute arbitrary SQL queries via the gauge.php file in AlienVault OSSIM/USM. Attackers can retrieve database information or read local system files using MySQL's LOAD_FILE function. Organizations running affected versions of AlienVault OSSIM or USM are vulnerable.
💻 Affected Systems
- AlienVault OSSIM
- AlienVault USM
📦 What is this software?
⚠️ Risk & Real-World Impact
Worst Case
Complete compromise of the AlienVault system including database exfiltration, file system access, and potential privilege escalation leading to full system control.
Likely Case
Database information theft including credentials, configuration data, and sensitive security information, plus potential file system access.
If Mitigated
Limited impact if proper network segmentation and access controls prevent external exploitation attempts.
🎯 Exploit Status
Exploit code is publicly available on Exploit-DB and other sources, making exploitation trivial for attackers.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: 5.3.2
Vendor Advisory: https://www.alienvault.com/forums/discussion/7766/security-advisory-alienvault-5-3-2-address-70-vulnerabilities
Restart Required: Yes
Instructions:
1. Backup your current configuration. 2. Download AlienVault 5.3.2 from the official portal. 3. Follow the upgrade guide to apply the patch. 4. Restart all AlienVault services. 5. Verify the upgrade completed successfully.
🔧 Temporary Workarounds
Restrict access to gauge.php
linuxBlock external access to the vulnerable gauge.php file using web server configuration or firewall rules.
# Apache: Add to .htaccess or virtual host config
<Files "gauge.php">
Order Deny,Allow
Deny from all
</Files>
# Nginx: Add to server block
location ~ /gauge\.php$ {
deny all;
return 403;
}
🧯 If You Can't Patch
- Implement strict network segmentation to isolate AlienVault systems from untrusted networks
- Deploy a WAF with SQL injection protection rules to block exploitation attempts
🔍 How to Verify
Check if Vulnerable:
Check if gauge.php exists in the web directory and test for SQL injection using safe payloads or check version number.
Check Version:
cat /etc/ossim/ossim_setup.conf | grep version
Verify Fix Applied:
Verify the system version is 5.3.2 or later and test that gauge.php no longer accepts SQL injection payloads.
📡 Detection & Monitoring
Log Indicators:
- Unusual SQL queries in database logs
- Multiple requests to gauge.php with SQL-like parameters
- LOAD_FILE function calls in MySQL logs
Network Indicators:
- HTTP requests to /gauge.php with SQL injection patterns
- Unusual outbound database connections from web server
SIEM Query:
source="web_access" AND uri="/gauge.php" AND (param="*SELECT*" OR param="*LOAD_FILE*" OR param="*UNION*" OR param="*OR 1=1*")
🔗 References
- http://www.securityfocus.com/bid/93866
- https://www.alienvault.com/forums/discussion/7766/security-advisory-alienvault-5-3-2-address-70-vulnerabilities
- https://www.exploit-db.com/exploits/40684/
- http://www.securityfocus.com/bid/93866
- https://www.alienvault.com/forums/discussion/7766/security-advisory-alienvault-5-3-2-address-70-vulnerabilities
- https://www.exploit-db.com/exploits/40684/