CVE-2016-8582

9.8 CRITICAL

📋 TL;DR

This vulnerability allows unauthenticated attackers to execute arbitrary SQL queries via the gauge.php file in AlienVault OSSIM/USM. Attackers can retrieve database information or read local system files using MySQL's LOAD_FILE function. Organizations running affected versions of AlienVault OSSIM or USM are vulnerable.

💻 Affected Systems

Products:
  • AlienVault OSSIM
  • AlienVault USM
Versions: All versions before 5.3.2
Operating Systems: Linux
Default Config Vulnerable: ⚠️ Yes
Notes: The gauge.php file is part of the standard installation and vulnerable in default configurations.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete compromise of the AlienVault system including database exfiltration, file system access, and potential privilege escalation leading to full system control.

🟠

Likely Case

Database information theft including credentials, configuration data, and sensitive security information, plus potential file system access.

🟢

If Mitigated

Limited impact if proper network segmentation and access controls prevent external exploitation attempts.

🌐 Internet-Facing: HIGH - The vulnerability is exploitable without authentication and has public exploit code available.
🏢 Internal Only: HIGH - Even internally, the vulnerability allows significant data exposure and potential lateral movement.

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: CONFIRMED
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Exploit code is publicly available on Exploit-DB and other sources, making exploitation trivial for attackers.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 5.3.2

Vendor Advisory: https://www.alienvault.com/forums/discussion/7766/security-advisory-alienvault-5-3-2-address-70-vulnerabilities

Restart Required: Yes

Instructions:

1. Backup your current configuration. 2. Download AlienVault 5.3.2 from the official portal. 3. Follow the upgrade guide to apply the patch. 4. Restart all AlienVault services. 5. Verify the upgrade completed successfully.

🔧 Temporary Workarounds

Restrict access to gauge.php

linux

Block external access to the vulnerable gauge.php file using web server configuration or firewall rules.

# Apache: Add to .htaccess or virtual host config
<Files "gauge.php">
    Order Deny,Allow
    Deny from all
</Files>
# Nginx: Add to server block
location ~ /gauge\.php$ {
    deny all;
    return 403;
}

🧯 If You Can't Patch

  • Implement strict network segmentation to isolate AlienVault systems from untrusted networks
  • Deploy a WAF with SQL injection protection rules to block exploitation attempts

🔍 How to Verify

Check if Vulnerable:

Check if gauge.php exists in the web directory and test for SQL injection using safe payloads or check version number.

Check Version:

cat /etc/ossim/ossim_setup.conf | grep version

Verify Fix Applied:

Verify the system version is 5.3.2 or later and test that gauge.php no longer accepts SQL injection payloads.

📡 Detection & Monitoring

Log Indicators:

  • Unusual SQL queries in database logs
  • Multiple requests to gauge.php with SQL-like parameters
  • LOAD_FILE function calls in MySQL logs

Network Indicators:

  • HTTP requests to /gauge.php with SQL injection patterns
  • Unusual outbound database connections from web server

SIEM Query:

source="web_access" AND uri="/gauge.php" AND (param="*SELECT*" OR param="*LOAD_FILE*" OR param="*UNION*" OR param="*OR 1=1*")

🔗 References

📤 Share & Export