Synopsis
This vulnerability was reported by Rapid7 and assigned CVE-2015-6004. Rapid7’s blog indicates that CVE-2015-6005 covers the SQL injection, and CVE-2015-6004 covers the XSS, but that doesn’t match what is in the CVE/NVD database. We reached out to CVE to clarify this, who quickly replied that their assignments are based on CERT VU 176160, and do not consider the Rapid7 blog a definitive source. CERT replied saying that was how they assigned and blamed Rapid7 who they would reach out to. Regardless, a new CVE ID is being assigned to this issue in keeping with CVE abstraction policy.
Rapid7’s article indicates that Ipswitch fixed the vulnerability on December 16, 2016. The CVE entry indicates that versions before 16.4 are vulnerable. Finally, Ipswitch even tweeted that they fixed the reported vulnerabilities but did not indicate the fixed version. Since you are reading this advisory, you've probably figured out that this was not fully fixed!
Looking at the WrFreeFormText.asp script, we see the UUID gets appended to an SQL query and executed. This is pretty clearly open for SQL injection abuse. Unfortunately, this is a visually impaired SQL injection (PC term), but we'll allow it. Some examples of exploitation were demonstrated that include displaying the server version and enumerating users. There are very few limits to what an attacker can do and include giving themselves full user rights or changing user names to JavaScript to be executed when the user list is displayed.
Note: That CVE is real! Congrats to the DWF project, a newly minted CNA that operates with transparency and focuses on faster turnaround for CVE assignments. We're their very first assignment. *blush*
Solution
Ipswitch has released version 16.5 to resolve this issue and re-branded the product to WhatsUp Gold 2016.
Additional References
http://www.ipswitch.com/products/network-monitoring.aspxhttp://jvndb.jvn.jp/ja/contents/2016/JVNDB-2016-005129.html
Disclosure Timeline
All information within TRA advisories is provided “as is”, without warranty of any kind, including the implied warranties of merchantability and fitness for a particular purpose, and with no guarantee of completeness, accuracy, or timeliness. Individuals and organizations are responsible for assessing the impact of any actual or potential security vulnerability.
Tenable takes product security very seriously. If you believe you have found a vulnerability in one of our products, we ask that you please work with us to quickly resolve it in order to protect customers. Tenable believes in responding quickly to such reports, maintaining communication with researchers, and providing a solution in short order.
For more details on submitting vulnerability information, please see our Vulnerability Reporting Guidelines page.
If you have questions or corrections about this advisory, please email [email protected]