漏洞描述: Infoblox NetMRI是一款网络管理工具,广泛用于企业网络环境中,用于自动化网络配置、合规性检查和故障排除。该产品在虚拟设备中部署,是企业网络基础设施的重要组成部分。该漏洞存在于NetMRI的Ruby on Rails组件中,由于使用了硬编码的会话cookie密钥,攻击者可以利用这一漏洞进行远程代码执行。具体来说,Rails web组件在验证会话cookie签名密钥时,如果密钥有效,会反序列化会话cookie。攻击者如果知道这一硬编码密钥,可以构造恶意的会话cookie,当这些cookie被应用程序反序列化时,会导致任意代码执行。这一漏洞与已知的Ruby on Rails反序列化漏洞(CVE-2013-0156)相关。Infoblox并未为此问题分配新的CVE编号,因为它是由底层Rails漏洞引起的。此漏洞的影响极为严重,攻击者可以利用它完全控制系统,可能导致数据泄露、服务中断或其他恶意活动。由于漏洞利用不需要认证,且可以自动化执行,因此风险极高。建议用户立即升级到Infoblox NetMRI 7.6.1或更高版本以修复此漏洞。
产品厂商: Infoblox
产品名称: NetMRI
影响版本: version < 7.6.1
搜索语法: http.title:”netmri” OR http.favicon.hash:”-319724102” OR icon_hash=”-319724102” OR “infoblox netmri”
info: name: Infoblox NetMRI < 7.6.1 - Remote Code Execution via Hardcoded Ruby Cookie Secret Key author: iamnoooob,pdresearch severity: critical description: | Infoblox NetMRI virtual appliances before version 7.6.1 are vulnerable to remote code execution (RCE) due to the use of a hardcoded Ruby on Rails session cookie secret key. The Rails web component deserializes session cookies if the signing key is valid. Attackers with knowledge of this key can craft malicious session cookies that are deserialized by the application, leading to arbitrary code execution. This vulnerability is related to the known Ruby on Rails deserialization flaw (CVE-2013-0156). Infoblox did not assign a new CVE for this issue, as it is a result of the underlying Rails vulnerability. impact: | An attacker can exploit this vulnerability to execute arbitrary commands on the NetMRI server, potentially leading to complete system compromise. remediation: | Upgrade Infoblox NetMRI to version 7.6.1 or later to mitigate this vulnerability. reference: - https://rhinosecuritylabs.com/research/infoblox-multiple-cves/ - https://nvd.nist.gov/vuln/detail/CVE-2013-0156 classification: cwe-id: CWE-502 metadata: verified: true max-request: 1 vendor: infoblox product: netmri shodan-query: - http.title:"netmri" - http.favicon.hash:"-319724102" fofa-query: - icon_hash="-319724102" - infoblox netmri tags: infoblox,netmri,rails,rce,deserialization,oast