This Wednesday, February 5, several vulnerabilities were detected in the EyesOfNetwork solution.

CVE Issue Fix
CVE-2020-8654 Discovery module to allows to run arbitrary OS command.
We were able to run the ‘id’ command with the following payload in the target field : ;id #’.
lilac-3.1-2+
CVE-2020-8655 LPE via nmap NSE script
As the apache user is allowed to run nmap as root, we were able to execute arbitrary commands by providing a specially crafted NSE script.
eonconf-5.3-0
CVE-2020-8656 SQLi in API in getApiKey function on ‘username’ field
PoC: onapi/getApiKey?username=’ union select sleep(3),0,0,0,0,0,0,0 or ‘
eonapi-2.0-2+
CVE-2020-8657 Calculable/guessable API key eonapi-2.0-2+

The association of these vulnerabilities allows an attacker to obtain a shell with root rights on an instance of EON 5.2 and 5.3 without prior information or login.

A patch was released Thursday, February 6, then packaged and is now available on the EyesOfNetwork repositories. [5.2, 5.3].

The patch is applied by executing the following command:

yum update eonapi lilac

** ⚠ Attention ⚠ **: Updating the eonapi package to version> = 2.0-2 will cause the regeneration of the APIKEY of the admin user. The new key should be retrieved and informed in third-party consumer tools API (ex: EyesOfIndicator, …).