Network Olympus 1.8.0 - SQL Injection
9.1
Critical
Discovered by
Offensive Team, Fluid Attacks
Summary
Full name
Network Olympus 1.8.0 - SQL Injection
Code name
State
Public
Release date
Feb 7, 2022
Affected product
Network Olympus
Affected version(s)
Version 1.8.0
Vulnerability name
SQL injection
Vulnerability type
Remotely exploitable
Yes
CVSS v3.1 vector string
CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H
CVSS v3.1 base score
9.1
Exploit available
No
CVE ID(s)
Description
Network Olympus version 1.8.0 allows an authenticated admin user to inject SQL queries in /api/eventinstance
via the sqlparameter
. It is also possible to achieve remote code execution in the default installation (PostgreSQL) by exploiting this issue.
Proof of Concept
Steps to reproduce
Log in to Network Olympus.
The application send a request to
/api/eventinstance
with a json as parameter in the url, the json parametersqlparameter
allows to inject sql queries. It can be exploited using boolean based sql or stacked queries.The following PoC can be used to make the database sleep for 2 seconds.
To achieve command execution it is possible to create a malicious DLL and then load it in postgresql.
Create a malicious postgres DLL extension.
Create a copy of the exploit found in the following session and copy the generated DLL to the same folder and rename it to
rev_shell.dll
.
System Information
Version: Network Olympus 1.8.0 (Trial Version).
Operating System: Windows 10.
Database and version: PostgreSQL 10.8, compiled by Visual C++ build 1800, 32-bit.
Exploit
Mitigation
By 2022-03-07 there is not a patch resolving the issue.
References
Vendor page https://www.network-olympus.com/monitoring/
Timeline
Vulnerability discovered
Feb 22, 2022
Vendor contacted
Feb 23, 2022
Public disclosure
Mar 7, 2022