Note: Local Privilege Escalation vulnerability in SEMS <= 3.3.2 MP12 allowing for escalations of privileges to that of the root superuser.
Summary
The tomcat users on an affected Symantec Encryption Management Server (SEMS) is susceptible to privilege escalation vulnerability resulting an gaining root privileges.
Affected Versions
- Symantec Encryption Management Server <= 3.3.2 MP11
CVSSv3 Score
7.8 (High)
CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
Technical Details
A reverse shell as tomcat is useful. Root is better. Getting there turned out to be straightforward.
The tomcat user had write access to /etc/cron.daily/tomcat.cron — a daily cron job executed in the context of the root superuser:
| |
Writable by tomcat, executed by root. That’s all you need. Appending a command to the cron job:
| |
After the next scheduled execution:
| |
Full root access. From a Reporter account. Via the search box.
Chaining CVE-2015-8151 into CVE-2015-8150 takes you from low-privileged web UI access to root on the underlying appliance. That’s the kind of finding that makes for a very interesting debrief conversation.
Timeline
| Date | Event |
|---|---|
| 2015-07-06 | Vulnerability discovered |
| 2015-07-30 | Vendor contacted |
| 2015-08-02 | Vendor confirms issue |
| 2016-02-19 | Patch released (v3.3.2 MP12) |
| 2016-06-07 | Public disclosure |
Remediation
Symantec product engineers have addressed these issues in Symantec Encryption Management Server 3.3.2 MP12. Customers should update to SEMS 3.3.2 MP12 as soon as possible to address these issues.
Credit
Discovered and reported by Toby Reynolds following responsible disclosure guidelines.