Checkmarx CxQL Sandbox bypass (CVE-2014-8778) | BOT24

Checkmarx CxQL Sandbox bypass (CVE-2014-8778)

Checkmarx CxQL Sandbox bypass (CVE-2014-8778)

Vendor: Checkmarx -
Product: CxSuite
Version affected: 7.1.5 and prior

Credit: Huy-Ngoc DAU (@ngocdh) of Deloitte Conseil, France

Checkmarx is a static source code analysis suite (

CxQL (Checkmarx Query Language) is a CSharp-based language defined by Checkmarx to query source code. CSharp critical classes/functions calls are however not allowed due to security reasons.

CxQL can be executed on two locations:
 - Remotely on Checkmarx server if the analyzed source code is uploaded via the web 
 - Or locally in CxAudit (a thick client connected to the enterprise Checkmarx server), 
installed on an auditor's code 
review workstation.

We identified a possibility of bypass that would allow execution of arbitrary and 
unauthorized CSharp code in those 
contexts, and thus compromise the security of the machine on which the code is executed, 
either a Checkmarx server or 
an auditor's workstation. 

The following scenarios describe attacks where this bypass is possible:
 - An auditor (a specific user allowed to execute his own CxQL queries) having only access to the Citrix interface of 
CxAudit can take control of the workstation,
 - A Checkmarx administrator having only access to Checkmarx web interface can take control of the Checkmarx enterprise 
server, and CxAudit workstations by injecting malicious code into default queries.

Technical details

1. Etablishing network connection
The following code attempts to make a network connection and return the content in the 
debug panel:
        System.Net.WebRequest request = System.Net.WebRequest.Create("";);
        System.Net.WebResponse response = request.GetResponse();
        CxDebug((new System.IO.StreamReader(response.GetResponseStream())).ReadToEnd());
catch (Exception e)

However, the following error message is returned:
Request for the permission of type 'System.Net.WebPermission, System, Version=, 
PublicKeyToken=xxx' failed.

We found that this permission issue could be bypassed by adding the following line before 
the code:
(new System.Net.WebPermission(System.Security.Permissions.PermissionState.Unrestricted)).

2. Executing system commands:
The following code attempts to open calc:
catch (Exception e)
Checkmarx Auditor would crash despite try/catch instruction.

By adding the following line, the code would be executed successfully:

25/10/2014 - bypass discovery
04/11/2014 - vendor notification
29/12/2014 - vendor asked to delay advisory publication 
21/07/2015 - patch confirmation from vendor in version 7.1.8
03/09/2015 - advisory publication


About Deloitte:
Deloitte refers to one or more of Deloitte Touche Tohmatsu Limited, a UK private company 
limited by guarantee, and its network of member firms, each of which is a legally separate and independent entity. Please see for a detailed description of 
the legal structure of Deloitte Touche Tohmatsu Limited and its member firms. In France, 
Deloitte SAS is the member firm of Deloitte Touche Tohmatsu Limited, and professional 
services are provided by its subsidiaries and affiliates.Our Enterprise Risk Services 
practice is made up of over 11,000 professionals providing services relating to security, 
privacy & resilience; data governance and analytics; information and controls assurance; 
risk management technologies; and technology risk & governance. We help organizations 
build value by taking a "Risk Intelligent" approach to managing financial, technology, 
and business risks.

Share on Google Plus

About Bradley Susser

    Blogger Comment
    Facebook Comment


Post a Comment