Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

CVE-2020-8445: analysisd: OS_CleanMSG allows control characters in msg. #1814

Open
cpu opened this issue Jan 15, 2020 · 1 comment
Open

CVE-2020-8445: analysisd: OS_CleanMSG allows control characters in msg. #1814

cpu opened this issue Jan 15, 2020 · 1 comment

Comments

@cpu
Copy link
Contributor

cpu commented Jan 15, 2020

The ossec-analysisd's OS_CleanMSG function doesn't remove or encode terminal control characters or newlines from processed log messages. In many cases those control characters/newline are later logged.

There have been cases where allowing arbitrary control characters in log messages has led to command execution with specific terminal emulator implementations. As a result many pieces of software (e.g. Apache HTTPD) have added escaping of control characters in log messages. It may also be possible to abuse terminal control characters to hide previous messages in a log, tricking system administrators into missing events.

Similarly, because newlines (\n) are permitted in messages processed by ossec-analysisd it may be possible to inject nested events to the ossec log. This may result in system administrators being tricked into thinking alerts fired that did not.

@cpu cpu changed the title analysisd: OS_CleanMSG allows control characters in msg. CVE-2020-8445: analysisd: OS_CleanMSG allows control characters in msg. Jan 30, 2020
@cpu
Copy link
Contributor Author

cpu commented Jan 30, 2020

This was assigned CVE-2020-8445

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

No branches or pull requests

1 participant