Vulnerability: OS Command Injection
OS Command Injection in Loadbalancer.org Appliance v8.3.8-134
Vendor: Loadbalancer.org, https://www.loadbalancer.org
Product: ENTERPRISE VA MAX
Version affected: Loadbalancer.org Appliance v8.3.8 as the latest in October 2019
Product description:
“Loadbalancer.org is a well-established international provider of reliable, versatile and cost-effective application delivery products and services. The load balancer experts help solve the issues of availability and scalability by providing an unbreakable solution to ensure zero downtime of critical IT applications.
Loadbalancer.org’s consultancy led approach means they have specialist engineers that will help design and simplify architecture guaranteeing painless deployments every single time. The team of experts are effortlessly able to set up test environments, document each deployment, provide customized solutions and assist with complex migrations. They will support a business, not just the load balancer!
Loadbalancer.org load balancers are sold as hardware, virtual or cloud formats and are more scalable, flexible and are economical compared to competitive offerings. With no performance or feature restrictions, their suite of products can load balance any application, for any company, in any industry, anywhere in the world.
Allowing customers to have direct access 24 hours a day 7 days a week to a team of passionate engineers via phone, online chat and e-mail sets Loadbalancer.org apart from other ADC vendors.
” as per statement on https://www.linkedin.com/company/loadbalancer-org website.
- CVE ID: CVE-2020-13378
- CWE ID: CWE-78
Proof of Concept
A command Injection vulnerability allows attackers to execute arbitrary OS commands via a crafted HTTP request. This is exploitable by an authenticated attacker who submits a modified GET request.
Sample GET request, issuing ‘id’ OS command returns ‘uid=48(apache)’
Identified vulnerable parameters: waf_filename
Request:
Public searches:
https://www.zoomeye.org/searchResult?q=Loadbalancer%2Corg
https://www.shodan.io/search?query=loadbalancer.org
but this company has interestingly some reputable partnership alliance
References
- https://www.immuniweb.com/vulnerability/os-command-injection.html
- https://www.loadbalancer.org
- https://cwe.mitre.org/data/definitions/78.html
- https://www.checkmarx.com/knowledge/knowledgebase/OS-Command_Injection