skip to navigation. Skip to the content.
> Advisories > rt-sa-2007-001 vertical divider

Alcatel-Lucent OmniPCX Remote Command Execution

RedTeam Pentesting discovered a remote command execution in the Alcatel-Lucent OmniPCX during a penetration test. The masterCGI script of the OmniPXC integrated communication solution web interface is vulnerable to a remote command execution. Attackers can run arbitrary commands with the permissions of the web application user. 


Details
=======

Product: Alcatel-Lucent OmniPCX
Affected Versions: All versions up to and including R7.1
Fixed Versions: All supported versions
Vulnerability Type: Remote Command Execution
Security-Risk: high
Vendor-URL: http://www1.alcatel-lucent.com/psirt/statements.htm
reference number 2007002
Vendor-Status: Informed, patch available
Advisory-URL: http://www.redteam-pentesting.de/advisories/rt-sa-2007-001
Advisory-Status: public
CVE: CVE-2007-3010
CVE-URL: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-3010


Introduction
============

"The OmniPCX Enterprise is an integrated communications solution for medium-sized businesses and large corporations. It combines the best of the old (legacy TDM phone connectivity) with the new (a native IP platform and support for Session Initiation Protocol, or SIP) to provide an effective and complete communications solution for cost-conscious companies on the cutting edge."

(from the vendor's homepage)


More Details
============

The OmniPCX web interface has a CGI script "masterCGI" which offers a "ping" functionality. By running the script with the parameters "ping" and "user", one is able to ping any IP address reachable from the server the webinterface is running on.

curl -k "https://www.example.com/cgi-bin/masterCGI?ping=nomip&user=127.0.0.1"

The ping will be done on the server, running the ping program installed on it. The vulnerability lies in the "user" variable not being filtered when passed to the shell. Thus, arbitrary commands can be executed on the server by adding them to the user variable, separated by semicolons. Spaces have to be encoded by using the internal field separator ${IFS}, as any normal or URL encoded space will abort the command execution. 


Proof of Concept
================

curl -k "https://www.example.com/cgi-bin/masterCGI?ping=nomip&user=;ls\${IFS}-l;"


Workaround
==========

Deactivate the Web server at the loss of some functionality not related to telephony service. Interpose a firewall allowing access to the web interface of the OXE to IP addresses who should have access to the server (e.g. maintenance technicians).


Fix
===

Correct filtering of shell meta-characters and tighter access control have been implemented in all supported versions.


Security Risk
=============

The risk of this vulnerability is high. Any user which has access to the web interface of the OmniPCX Enterprise solution will be able to execute arbitrary commands on the server with the permissions of the webserver. 


History
=======

2007-05-07 First contact with head of technical staff of Alcatel-Lucent. 
Will relay the information to their technicians and call back 
with further information.
2007-05-09 Response with a pointer to the Alcatel-Lucent PSIRT and the
website http://www1.alcatel-lucent.com/psirt, where the
process of reporting a security vulnerability is explained.
The advisory gets mailed to the email address provided there.
2007-05-10 Advisory gets acknowledged by the PSIRT
2007-05-23 Vulnerability gets confirmed by Alcatel-Lucent
2007-06-18 CVE number assigned
2007-09-17 Coordinated public release with Alcatel-Lucent
2009-05-08 Updated Advisory URL


References
==========

http://www1.alcatel-lucent.com/psirt/statements.htm
reference number 2007002


RedTeam Pentesting GmbH
=======================

RedTeam Pentesting offers individual penetration tests, short pentests, performed by a team of specialised IT-security experts. Hereby, security weaknesses in company networks or products are uncovered and can be fixed immediately.

As there are only few experts in this field, RedTeam Pentesting wants to share its knowledge and enhance the public knowledge with research in security-related areas. The results are made available as public security advisories.

More information about RedTeam Pentesting can be found at http://www.redteam-pentesting.de.