ID

VAR-201203-0247


CVE

CVE-2012-1842


TITLE

Quantum Scalar i500, Dell ML6000 and IBM TS3310 tape libraries web interface and preconfigured password vulnerabilities

Trust: 0.8

sources: CERT/CC: VU#913483

DESCRIPTION

Cross-site scripting (XSS) vulnerability in checkQKMProg.htm on the Quantum Scalar i500 tape library with firmware before i7.0.3 (604G.GS00100), also distributed as the Dell ML6000 tape library with firmware before A20-00 (590G.GS00100), allows remote attackers to inject arbitrary web script or HTML via unspecified vectors. (2) http://device/checkQKMProg.htm There is a cross-site scripting vulnerability that allows you to get the session ID. (3) The POST parameter executes any command with the ROOT user. An information-disclosure vulnerability 2. A cross-site request-forgery vulnerability 4. A security-bypass vulnerability An attacker may leverage these issues to execute arbitrary script code in the browser of an unsuspecting user in the context of the affected site. This may let the attacker steal cookie-based authentication credentials and launch other attacks. The information-disclosure vulnerability can allow the attacker to obtain sensitive information that may aid in launching further attacks. Exploiting the cross-site request-forgery may allow a remote attacker to perform certain administrative actions and gain unauthorized access to the affected application. Other attacks are also possible. Attackers can exploit a password weakness issue to bypass security restrictions to obtain sensitive information or perform unauthorized actions; this may aid in launching further attacks. ---------------------------------------------------------------------- Become a PSI 3.0 beta tester! Test-drive the new beta version and tell us what you think about its extended automatic update function and significantly enhanced user-interface. Download it here! http://secunia.com/psi_30_beta_launch ---------------------------------------------------------------------- TITLE: Quantum Scalar i500 Multiple Vulnerabilities SECUNIA ADVISORY ID: SA48403 VERIFY ADVISORY: Secunia.com http://secunia.com/advisories/48403/ Customer Area (Credentials Required) https://ca.secunia.com/?page=viewadvisory&vuln_id=48403 RELEASE DATE: 2012-03-20 DISCUSS ADVISORY: http://secunia.com/advisories/48403/#comments AVAILABLE ON SITE AND IN CUSTOMER AREA: * Last Update * Popularity * Comments * Criticality Level * Impact * Where * Solution Status * Operating System / Software * CVE Reference(s) http://secunia.com/advisories/48403/ ONLY AVAILABLE IN CUSTOMER AREA: * Authentication Level * Report Reliability * Secunia PoC * Secunia Analysis * Systems Affected * Approve Distribution * Remediation Status * Secunia CVSS Score * CVSS https://ca.secunia.com/?page=viewadvisory&vuln_id=48403 ONLY AVAILABLE WITH SECUNIA CSI AND SECUNIA PSI: * AUTOMATED SCANNING http://secunia.com/vulnerability_scanning/personal/ http://secunia.com/vulnerability_scanning/corporate/wsus_sccm_3rd_third_party_patching/ DESCRIPTION: Multiple vulnerabilities have been reported in Quantum Scalar i500, which can be exploited by malicious people to disclose potentially sensitive information and conduct cross-site scripting and request forgery attacks. 1) Input passed via e.g. the "file" parameter to logShow.html is not properly verified before being used to display files. This can be exploited to disclose the contents of arbitrary files via directory traversal sequences. 2) Certain input passed via checkQKMProg.htm is not properly sanitised before being returned to the user. This can be exploited to e.g. SOLUTION: Update to firmware version i7.0.3 (604G.GS00100) or later. PROVIDED AND/OR DISCOVERED BY: US-CERT credits NOAA CIRT. ORIGINAL ADVISORY: US-CERT: http://www.kb.cert.org/vuls/id/913483 OTHER REFERENCES: Further details available in Customer Area: http://secunia.com/vulnerability_intelligence/ DEEP LINKS: Further details available in Customer Area: http://secunia.com/vulnerability_intelligence/ EXTENDED DESCRIPTION: Further details available in Customer Area: http://secunia.com/vulnerability_intelligence/ EXTENDED SOLUTION: Further details available in Customer Area: http://secunia.com/vulnerability_intelligence/ EXPLOIT: Further details available in Customer Area: http://secunia.com/vulnerability_intelligence/ ---------------------------------------------------------------------- About: This Advisory was delivered by Secunia as a free service to help private users keeping their systems up to date against the latest vulnerabilities. Subscribe: http://secunia.com/advisories/secunia_security_advisories/ Definitions: (Criticality, Where etc.) http://secunia.com/advisories/about_secunia_advisories/ Please Note: Secunia recommends that you verify all advisories you receive by clicking the link. Secunia NEVER sends attached files with advisories. Secunia does not advise people to install third party patches, only use those supplied by the vendor. ---------------------------------------------------------------------- Unsubscribe: Secunia Security Advisories http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org ----------------------------------------------------------------------

Trust: 3.96

sources: NVD: CVE-2012-1842 // CERT/CC: VU#913483 // JVNDB: JVNDB-2012-001912 // CNVD: CNVD-2012-1432 // CNVD: CNVD-2012-1434 // BID: 52566 // VULHUB: VHN-55123 // PACKETSTORM: 111009 // PACKETSTORM: 111008

IOT TAXONOMY

category:['Network device']sub_category: -

Trust: 1.2

sources: CNVD: CNVD-2012-1432 // CNVD: CNVD-2012-1434

AFFECTED PRODUCTS

vendor:dellmodel:powervault ml6000scope:eqversion:585g.gs003

Trust: 1.6

vendor:quantummodel:scalar i500scope:eqversion:0

Trust: 1.5

vendor:dellmodel:ml6000scope:eqversion:0

Trust: 1.5

vendor:ibmmodel:ts3310scope:eqversion:0

Trust: 1.5

vendor:dellmodel:powervault ml6030scope:eqversion:23u

Trust: 1.0

vendor:quantummodel:scalar i500scope:eqversion:i7

Trust: 1.0

vendor:quantummodel:scalar i500scope:lteversion:i7.0.2

Trust: 1.0

vendor:quantummodel:scalar i500scope:eqversion:i3.1

Trust: 1.0

vendor:quantummodel:scalar i500scope:eqversion:i7.0.1

Trust: 1.0

vendor:quantummodel:scalar i500scope:eqversion:i3

Trust: 1.0

vendor:dellmodel:powervault ml6000scope:eqversion:41u

Trust: 1.0

vendor:quantummodel:scalar i500scope:eqversion:23u

Trust: 1.0

vendor:quantummodel:scalar i500scope:eqversion:i2

Trust: 1.0

vendor:quantummodel:scalar i500scope:eqversion:5u

Trust: 1.0

vendor:quantummodel:scalar i500scope:eqversion:i4

Trust: 1.0

vendor:quantummodel:scalar i500scope:eqversion:i5

Trust: 1.0

vendor:quantummodel:scalar i500scope:eqversion:i6.1

Trust: 1.0

vendor:quantummodel:scalar i500scope:eqversion:i6

Trust: 1.0

vendor:quantummodel:scalar i500scope:eqversion:sp4.2

Trust: 1.0

vendor:dellmodel:powervault ml6020scope:eqversion:14u

Trust: 1.0

vendor:dellmodel:powervault ml6010scope:eqversion:5u

Trust: 1.0

vendor:quantummodel:scalar i500scope:eqversion:sp4

Trust: 1.0

vendor:dellmodel:powervault ml6000scope:eqversion:32u

Trust: 1.0

vendor:quantummodel:scalar i500scope:eqversion:i5.1

Trust: 1.0

vendor:quantummodel:scalar i500scope:eqversion:14u

Trust: 1.0

vendor:dell computermodel: - scope: - version: -

Trust: 0.8

vendor:ibmmodel: - scope: - version: -

Trust: 0.8

vendor:quantummodel: - scope: - version: -

Trust: 0.8

vendor:quantummodel:scalar i500scope:ltversion:14u firmware i7.0.3 (604g.gs00100)

Trust: 0.8

vendor:quantummodel:scalar i500scope:ltversion:23u firmware i7.0.3 (604g.gs00100)

Trust: 0.8

vendor:quantummodel:scalar i500scope:ltversion:5u firmware i7.0.3 (604g.gs00100)

Trust: 0.8

vendor:quantummodel:scalar i500scope:ltversion:i7.0.3 (604g.gs00100)

Trust: 0.8

vendor:dellmodel:powervault ml6000scope:ltversion:32u firmware a20-00 (590g.gs00100)

Trust: 0.8

vendor:dellmodel:powervault ml6000scope:ltversion:41u firmware a20-00 (590g.gs00100)

Trust: 0.8

vendor:dellmodel:powervault ml6000scope:ltversion:a20-00 (590g.gs00100)

Trust: 0.8

vendor:dellmodel:powervault ml6010scope:ltversion:5u firmware a20-00 (590g.gs00100)

Trust: 0.8

vendor:dellmodel:powervault ml6020scope:ltversion:14u firmware a20-00 (590g.gs00100)

Trust: 0.8

vendor:dellmodel:powervault ml6030scope:ltversion:23u firmware a20-00 (590g.gs00100)

Trust: 0.8

vendor:quantummodel:scalar i500 i7.0.3scope:neversion: -

Trust: 0.3

vendor:ibmmodel:ts3310 r6cscope:neversion: -

Trust: 0.3

vendor:dellmodel:ml6000 a20-00scope:neversion: -

Trust: 0.3

sources: CERT/CC: VU#913483 // CNVD: CNVD-2012-1432 // CNVD: CNVD-2012-1434 // BID: 52566 // JVNDB: JVNDB-2012-001912 // CNNVD: CNNVD-201203-442 // NVD: CVE-2012-1842

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2012-1842
value: LOW

Trust: 1.0

NVD: CVE-2012-1842
value: LOW

Trust: 0.8

CNNVD: CNNVD-201203-442
value: LOW

Trust: 0.6

VULHUB: VHN-55123
value: LOW

Trust: 0.1

nvd@nist.gov: CVE-2012-1842
severity: LOW
baseScore: 3.5
vectorString: AV:N/AC:M/AU:S/C:N/I:P/A:N
accessVector: NETWORK
accessComplexity: MEDIUM
authentication: SINGLE
confidentialityImpact: NONE
integrityImpact: PARTIAL
availabilityImpact: NONE
exploitabilityScore: 6.8
impactScore: 2.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.8

VULHUB: VHN-55123
severity: LOW
baseScore: 3.5
vectorString: AV:N/AC:M/AU:S/C:N/I:P/A:N
accessVector: NETWORK
accessComplexity: MEDIUM
authentication: SINGLE
confidentialityImpact: NONE
integrityImpact: PARTIAL
availabilityImpact: NONE
exploitabilityScore: 6.8
impactScore: 2.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.1

sources: VULHUB: VHN-55123 // JVNDB: JVNDB-2012-001912 // CNNVD: CNNVD-201203-442 // NVD: CVE-2012-1842

PROBLEMTYPE DATA

problemtype:CWE-79

Trust: 1.9

sources: VULHUB: VHN-55123 // JVNDB: JVNDB-2012-001912 // NVD: CVE-2012-1842

THREAT TYPE

remote

Trust: 0.6

sources: CNNVD: CNNVD-201203-442

TYPE

xss

Trust: 0.8

sources: PACKETSTORM: 111009 // PACKETSTORM: 111008 // CNNVD: CNNVD-201203-442

CONFIGURATIONS

sources: JVNDB: JVNDB-2012-001912

PATCH

title:Welcome to Dell Technical Supporturl:http://support.dell.com/

Trust: 0.8

title:Scalar i500url:http://www.quantum.com/ServiceandSupport/SoftwareandDocumentationDownloads/SI500/Index.aspx

Trust: 0.8

title:Patch for Quantum Scalar i500, Dell ML6000 and IBM TS3310 Enterprise Tape Library WEB Interface Cross-Site Scripting Vulnerabilityurl:https://www.cnvd.org.cn/patchInfo/show/14191

Trust: 0.6

title:Quantum Scalar i500, Dell ML6000 and IBM TS3310 Tape Library Preconfigured Password Vulnerability Patchurl:https://www.cnvd.org.cn/patchInfo/show/14192

Trust: 0.6

sources: CNVD: CNVD-2012-1432 // CNVD: CNVD-2012-1434 // JVNDB: JVNDB-2012-001912

EXTERNAL IDS

db:CERT/CCid:VU#913483

Trust: 5.0

db:NVDid:CVE-2012-1842

Trust: 2.8

db:BIDid:52566

Trust: 1.5

db:SECUNIAid:48453

Trust: 1.3

db:SECUNIAid:48403

Trust: 1.3

db:OSVDBid:80225

Trust: 1.1

db:OSVDBid:80239

Trust: 1.1

db:JVNDBid:JVNDB-2012-001912

Trust: 0.8

db:CNNVDid:CNNVD-201203-442

Trust: 0.7

db:CNVDid:CNVD-2012-1432

Trust: 0.6

db:CNVDid:CNVD-2012-1434

Trust: 0.6

db:CERT/CCid:HTTP://WWW.KB.CERT.ORG/VULS/ID/MAPG-8NVRPY

Trust: 0.6

db:CERT/CCid:HTTP://WWW.KB.CERT.ORG/VULS/ID/MAPG-8NNKN8

Trust: 0.6

db:VULHUBid:VHN-55123

Trust: 0.1

db:PACKETSTORMid:111009

Trust: 0.1

db:PACKETSTORMid:111008

Trust: 0.1

sources: CERT/CC: VU#913483 // CNVD: CNVD-2012-1432 // CNVD: CNVD-2012-1434 // VULHUB: VHN-55123 // BID: 52566 // JVNDB: JVNDB-2012-001912 // PACKETSTORM: 111009 // PACKETSTORM: 111008 // CNNVD: CNNVD-201203-442 // NVD: CVE-2012-1842

REFERENCES

url:http://www.kb.cert.org/vuls/id/913483

Trust: 4.2

url:http://www.quantum.com/serviceandsupport/softwareanddocumentationdownloads/si500/index.aspx

Trust: 1.9

url:http://www-933.ibm.com/support/fixcentral/

Trust: 1.9

url:http://www.kb.cert.org/vuls/id/mapg-8nnkn8

Trust: 1.7

url:http://www.kb.cert.org/vuls/id/mapg-8nvrpy

Trust: 1.7

url:http://support.dell.com

Trust: 1.6

url:http://osvdb.org/80225

Trust: 1.1

url:http://osvdb.org/80239

Trust: 1.1

url:http://secunia.com/advisories/48403

Trust: 1.1

url:http://secunia.com/advisories/48453

Trust: 1.1

url:http://cwe.mitre.org/data/definitions/552.html

Trust: 0.8

url:http://cwe.mitre.org/data/definitions/200.html

Trust: 0.8

url:http://cwe.mitre.org/data/definitions/352.html

Trust: 0.8

url:http://cwe.mitre.org/data/definitions/259.html

Trust: 0.8

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2012-1842

Trust: 0.8

url:http://jvn.jp/cert/jvnvu913483/

Trust: 0.8

url:http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2012-1842

Trust: 0.8

url:http://dell.com

Trust: 0.3

url:http://secunia.com/psi_30_beta_launch

Trust: 0.2

url:http://secunia.com/vulnerability_intelligence/

Trust: 0.2

url:http://secunia.com/vulnerability_scanning/corporate/wsus_sccm_3rd_third_party_patching/

Trust: 0.2

url:http://secunia.com/advisories/secunia_security_advisories/

Trust: 0.2

url:http://secunia.com/advisories/about_secunia_advisories/

Trust: 0.2

url:http://secunia.com/vulnerability_scanning/personal/

Trust: 0.2

url:http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org

Trust: 0.2

url:http://secunia.com/advisories/48453/#comments

Trust: 0.1

url:https://ca.secunia.com/?page=viewadvisory&vuln_id=48453

Trust: 0.1

url:http://secunia.com/advisories/48453/

Trust: 0.1

url:http://secunia.com/advisories/48403/

Trust: 0.1

url:https://ca.secunia.com/?page=viewadvisory&vuln_id=48403

Trust: 0.1

url:http://secunia.com/advisories/48403/#comments

Trust: 0.1

sources: CERT/CC: VU#913483 // CNVD: CNVD-2012-1432 // CNVD: CNVD-2012-1434 // VULHUB: VHN-55123 // BID: 52566 // JVNDB: JVNDB-2012-001912 // PACKETSTORM: 111009 // PACKETSTORM: 111008 // CNNVD: CNNVD-201203-442 // NVD: CVE-2012-1842

CREDITS

NOAA CIRT

Trust: 0.3

sources: BID: 52566

SOURCES

db:CERT/CCid:VU#913483
db:CNVDid:CNVD-2012-1432
db:CNVDid:CNVD-2012-1434
db:VULHUBid:VHN-55123
db:BIDid:52566
db:JVNDBid:JVNDB-2012-001912
db:PACKETSTORMid:111009
db:PACKETSTORMid:111008
db:CNNVDid:CNNVD-201203-442
db:NVDid:CVE-2012-1842

LAST UPDATE DATE

2025-04-11T21:41:46.940000+00:00


SOURCES UPDATE DATE

db:CERT/CCid:VU#913483date:2014-07-29T00:00:00
db:CNVDid:CNVD-2012-1432date:2012-03-23T00:00:00
db:CNVDid:CNVD-2012-1434date:2012-03-23T00:00:00
db:VULHUBid:VHN-55123date:2018-01-10T00:00:00
db:BIDid:52566date:2013-03-13T17:25:00
db:JVNDBid:JVNDB-2012-001912date:2012-06-15T00:00:00
db:CNNVDid:CNNVD-201203-442date:2012-03-23T00:00:00
db:NVDid:CVE-2012-1842date:2025-04-11T00:51:21.963

SOURCES RELEASE DATE

db:CERT/CCid:VU#913483date:2012-03-19T00:00:00
db:CNVDid:CNVD-2012-1432date:2012-03-23T00:00:00
db:CNVDid:CNVD-2012-1434date:2012-03-23T00:00:00
db:VULHUBid:VHN-55123date:2012-03-22T00:00:00
db:BIDid:52566date:2012-03-19T00:00:00
db:JVNDBid:JVNDB-2012-001912date:2012-03-26T00:00:00
db:PACKETSTORMid:111009date:2012-03-20T04:06:39
db:PACKETSTORMid:111008date:2012-03-20T04:06:35
db:CNNVDid:CNNVD-201203-442date:2012-03-23T00:00:00
db:NVDid:CVE-2012-1842date:2012-03-22T10:17:11.050