ID

VAR-201203-0249


CVE

CVE-2012-1844


TITLE

Quantum Scalar i500, Dell ML6000 and IBM TS3310 tape libraries web interface and preconfigured password vulnerabilities

Trust: 0.8

sources: CERT/CC: VU#913483

DESCRIPTION

The Quantum Scalar i500 tape library with firmware before i7.0.3 (604G.GS00100), also distributed as the Dell ML6000 tape library with firmware before A20-00 (590G.GS00100) and the IBM TS3310 tape library with firmware before R6C (606G.GS001), uses default passwords for unspecified user accounts, which makes it easier for remote attackers to obtain access via unknown vectors. Cross scripting and preconfigured password vulnerabilities have been reported to exist in the Quantum Scalar i500, Dell ML6000 and IBM TS3310 tape libraries. The Quantum Scalar i500 and Dell ML6000 tape libraries contain the following WEB interface vulnerabilities: (1) The WEB interface allows unauthenticated remote users to view any file on the WEB server, such as http://device/logShow.htm?file=/etc/shadow . (2) http://device/checkQKMProg.htm There is a cross-site scripting vulnerability that allows you to get the session ID. (3) The POST parameter executes any command with the ROOT user. An information-disclosure vulnerability 2. A cross-site request-forgery vulnerability 4. A security-bypass vulnerability An attacker may leverage these issues to execute arbitrary script code in the browser of an unsuspecting user in the context of the affected site. This may let the attacker steal cookie-based authentication credentials and launch other attacks. The information-disclosure vulnerability can allow the attacker to obtain sensitive information that may aid in launching further attacks. Exploiting the cross-site request-forgery may allow a remote attacker to perform certain administrative actions and gain unauthorized access to the affected application. Other attacks are also possible. Attackers can exploit a password weakness issue to bypass security restrictions to obtain sensitive information or perform unauthorized actions; this may aid in launching further attacks. ---------------------------------------------------------------------- Become a PSI 3.0 beta tester! Test-drive the new beta version and tell us what you think about its extended automatic update function and significantly enhanced user-interface. Download it here! http://secunia.com/psi_30_beta_launch ---------------------------------------------------------------------- TITLE: Quantum Scalar i500 Multiple Vulnerabilities SECUNIA ADVISORY ID: SA48403 VERIFY ADVISORY: Secunia.com http://secunia.com/advisories/48403/ Customer Area (Credentials Required) https://ca.secunia.com/?page=viewadvisory&vuln_id=48403 RELEASE DATE: 2012-03-20 DISCUSS ADVISORY: http://secunia.com/advisories/48403/#comments AVAILABLE ON SITE AND IN CUSTOMER AREA: * Last Update * Popularity * Comments * Criticality Level * Impact * Where * Solution Status * Operating System / Software * CVE Reference(s) http://secunia.com/advisories/48403/ ONLY AVAILABLE IN CUSTOMER AREA: * Authentication Level * Report Reliability * Secunia PoC * Secunia Analysis * Systems Affected * Approve Distribution * Remediation Status * Secunia CVSS Score * CVSS https://ca.secunia.com/?page=viewadvisory&vuln_id=48403 ONLY AVAILABLE WITH SECUNIA CSI AND SECUNIA PSI: * AUTOMATED SCANNING http://secunia.com/vulnerability_scanning/personal/ http://secunia.com/vulnerability_scanning/corporate/wsus_sccm_3rd_third_party_patching/ DESCRIPTION: Multiple vulnerabilities have been reported in Quantum Scalar i500, which can be exploited by malicious people to disclose potentially sensitive information and conduct cross-site scripting and request forgery attacks. 1) Input passed via e.g. the "file" parameter to logShow.html is not properly verified before being used to display files. This can be exploited to disclose the contents of arbitrary files via directory traversal sequences. 2) Certain input passed via checkQKMProg.htm is not properly sanitised before being returned to the user. This can be exploited to e.g. SOLUTION: Update to firmware version i7.0.3 (604G.GS00100) or later. PROVIDED AND/OR DISCOVERED BY: US-CERT credits NOAA CIRT. ORIGINAL ADVISORY: US-CERT: http://www.kb.cert.org/vuls/id/913483 OTHER REFERENCES: Further details available in Customer Area: http://secunia.com/vulnerability_intelligence/ DEEP LINKS: Further details available in Customer Area: http://secunia.com/vulnerability_intelligence/ EXTENDED DESCRIPTION: Further details available in Customer Area: http://secunia.com/vulnerability_intelligence/ EXTENDED SOLUTION: Further details available in Customer Area: http://secunia.com/vulnerability_intelligence/ EXPLOIT: Further details available in Customer Area: http://secunia.com/vulnerability_intelligence/ ---------------------------------------------------------------------- About: This Advisory was delivered by Secunia as a free service to help private users keeping their systems up to date against the latest vulnerabilities. Subscribe: http://secunia.com/advisories/secunia_security_advisories/ Definitions: (Criticality, Where etc.) http://secunia.com/advisories/about_secunia_advisories/ Please Note: Secunia recommends that you verify all advisories you receive by clicking the link. Secunia NEVER sends attached files with advisories. Secunia does not advise people to install third party patches, only use those supplied by the vendor. ---------------------------------------------------------------------- Unsubscribe: Secunia Security Advisories http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org ----------------------------------------------------------------------

Trust: 3.96

sources: NVD: CVE-2012-1844 // CERT/CC: VU#913483 // JVNDB: JVNDB-2012-001914 // CNVD: CNVD-2012-1432 // CNVD: CNVD-2012-1434 // BID: 52566 // VULHUB: VHN-55125 // PACKETSTORM: 111009 // PACKETSTORM: 111008

IOT TAXONOMY

category:['Network device']sub_category: -

Trust: 1.2

sources: CNVD: CNVD-2012-1432 // CNVD: CNVD-2012-1434

AFFECTED PRODUCTS

vendor:quantummodel:scalar i500scope:eqversion:0

Trust: 1.5

vendor:dellmodel:ml6000scope:eqversion:0

Trust: 1.5

vendor:ibmmodel:ts3310scope:eqversion:0

Trust: 1.5

vendor:dellmodel:powervault ml6030scope:eqversion:23u

Trust: 1.0

vendor:ibmmodel:ts3310 tape libraryscope:eqversion:3576

Trust: 1.0

vendor:ibmmodel:ts3310 tape libraryscope:lteversion:605g.g002

Trust: 1.0

vendor:quantummodel:scalar i500scope:eqversion:i7

Trust: 1.0

vendor:quantummodel:scalar i500scope:lteversion:i7.0.2

Trust: 1.0

vendor:quantummodel:scalar i500scope:eqversion:i3.1

Trust: 1.0

vendor:quantummodel:scalar i500scope:eqversion:i7.0.1

Trust: 1.0

vendor:quantummodel:scalar i500scope:eqversion:i3

Trust: 1.0

vendor:dellmodel:powervault ml6000scope:eqversion:41u

Trust: 1.0

vendor:quantummodel:scalar i500scope:eqversion:23u

Trust: 1.0

vendor:quantummodel:scalar i500scope:eqversion:i2

Trust: 1.0

vendor:quantummodel:scalar i500scope:eqversion:5u

Trust: 1.0

vendor:quantummodel:scalar i500scope:eqversion:i4

Trust: 1.0

vendor:quantummodel:scalar i500scope:eqversion:i5

Trust: 1.0

vendor:quantummodel:scalar i500scope:eqversion:i6.1

Trust: 1.0

vendor:quantummodel:scalar i500scope:eqversion:i6

Trust: 1.0

vendor:quantummodel:scalar i500scope:eqversion:sp4.2

Trust: 1.0

vendor:dellmodel:powervault ml6000scope:eqversion:585g.gs003

Trust: 1.0

vendor:dellmodel:powervault ml6020scope:eqversion:14u

Trust: 1.0

vendor:dellmodel:powervault ml6010scope:eqversion:5u

Trust: 1.0

vendor:quantummodel:scalar i500scope:eqversion:sp4

Trust: 1.0

vendor:dellmodel:powervault ml6000scope:eqversion:32u

Trust: 1.0

vendor:ibmmodel:ts3310 tape libraryscope:eqversion:3573

Trust: 1.0

vendor:quantummodel:scalar i500scope:eqversion:i5.1

Trust: 1.0

vendor:quantummodel:scalar i500scope:eqversion:14u

Trust: 1.0

vendor:dell computermodel: - scope: - version: -

Trust: 0.8

vendor:ibmmodel: - scope: - version: -

Trust: 0.8

vendor:quantummodel: - scope: - version: -

Trust: 0.8

vendor:ibmmodel:ts3310 tape libraryscope:ltversion:firmware r6c (606g.gs001)

Trust: 0.8

vendor:ibmmodel:ts3310 tape libraryscope:ltversion:r6c (606g.gs001)

Trust: 0.8

vendor:quantummodel:scalar i500scope:ltversion:14u firmware i7.0.3 (604g.gs00100)

Trust: 0.8

vendor:quantummodel:scalar i500scope:ltversion:23u firmware i7.0.3 (604g.gs00100)

Trust: 0.8

vendor:quantummodel:scalar i500scope:ltversion:5u firmware i7.0.3 (604g.gs00100)

Trust: 0.8

vendor:quantummodel:scalar i500scope:ltversion:i7.0.3 (604g.gs00100)

Trust: 0.8

vendor:dellmodel:powervault ml6000scope:ltversion:32u firmware a20-00 (590g.gs00100)

Trust: 0.8

vendor:dellmodel:powervault ml6000scope:ltversion:41u firmware a20-00 (590g.gs00100)

Trust: 0.8

vendor:dellmodel:powervault ml6000scope:ltversion:a20-00 (590g.gs00100)

Trust: 0.8

vendor:dellmodel:powervault ml6010scope:ltversion:5u firmware a20-00 (590g.gs00100)

Trust: 0.8

vendor:dellmodel:powervault ml6020scope:ltversion:14u firmware a20-00 (590g.gs00100)

Trust: 0.8

vendor:dellmodel:powervault ml6030scope:ltversion:23u firmware a20-00 (590g.gs00100)

Trust: 0.8

vendor:ibmmodel:ts3310 tape libraryscope:eqversion:605g.g002

Trust: 0.6

vendor:quantummodel:scalar i500 i7.0.3scope:neversion: -

Trust: 0.3

vendor:ibmmodel:ts3310 r6cscope:neversion: -

Trust: 0.3

vendor:dellmodel:ml6000 a20-00scope:neversion: -

Trust: 0.3

sources: CERT/CC: VU#913483 // CNVD: CNVD-2012-1432 // CNVD: CNVD-2012-1434 // BID: 52566 // JVNDB: JVNDB-2012-001914 // CNNVD: CNNVD-201203-444 // NVD: CVE-2012-1844

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2012-1844
value: HIGH

Trust: 1.0

NVD: CVE-2012-1844
value: HIGH

Trust: 0.8

CNNVD: CNNVD-201203-444
value: HIGH

Trust: 0.6

VULHUB: VHN-55125
value: HIGH

Trust: 0.1

nvd@nist.gov: CVE-2012-1844
severity: HIGH
baseScore: 7.5
vectorString: AV:N/AC:L/AU:N/C:P/I:P/A:P
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: PARTIAL
availabilityImpact: PARTIAL
exploitabilityScore: 10.0
impactScore: 6.4
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.8

VULHUB: VHN-55125
severity: HIGH
baseScore: 7.5
vectorString: AV:N/AC:L/AU:N/C:P/I:P/A:P
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: PARTIAL
availabilityImpact: PARTIAL
exploitabilityScore: 10.0
impactScore: 6.4
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.1

sources: VULHUB: VHN-55125 // JVNDB: JVNDB-2012-001914 // CNNVD: CNNVD-201203-444 // NVD: CVE-2012-1844

PROBLEMTYPE DATA

problemtype:CWE-255

Trust: 1.9

sources: VULHUB: VHN-55125 // JVNDB: JVNDB-2012-001914 // NVD: CVE-2012-1844

THREAT TYPE

remote

Trust: 0.6

sources: CNNVD: CNNVD-201203-444

TYPE

trust management

Trust: 0.6

sources: CNNVD: CNNVD-201203-444

CONFIGURATIONS

sources: JVNDB: JVNDB-2012-001914

PATCH

title:Welcome to Dell Technical Supporturl:http://support.dell.com/

Trust: 0.8

title:IBM System Storage TS3310 テープ・ライブラリーurl:http://www-06.ibm.com/systems/jp/storage/products/tape/3310/

Trust: 0.8

title:Scalar i500url:http://www.quantum.com/ServiceandSupport/SoftwareandDocumentationDownloads/SI500/Index.aspx

Trust: 0.8

title:Patch for Quantum Scalar i500, Dell ML6000 and IBM TS3310 Enterprise Tape Library WEB Interface Cross-Site Scripting Vulnerabilityurl:https://www.cnvd.org.cn/patchInfo/show/14191

Trust: 0.6

title:Quantum Scalar i500, Dell ML6000 and IBM TS3310 Tape Library Preconfigured Password Vulnerability Patchurl:https://www.cnvd.org.cn/patchInfo/show/14192

Trust: 0.6

sources: CNVD: CNVD-2012-1432 // CNVD: CNVD-2012-1434 // JVNDB: JVNDB-2012-001914

EXTERNAL IDS

db:CERT/CCid:VU#913483

Trust: 5.0

db:NVDid:CVE-2012-1844

Trust: 2.8

db:BIDid:52566

Trust: 1.5

db:OSVDBid:80372

Trust: 1.1

db:JVNDBid:JVNDB-2012-001914

Trust: 0.8

db:CNNVDid:CNNVD-201203-444

Trust: 0.7

db:CNVDid:CNVD-2012-1432

Trust: 0.6

db:CNVDid:CNVD-2012-1434

Trust: 0.6

db:CERT/CCid:HTTP://WWW.KB.CERT.ORG/VULS/ID/MAPG-8NNKN8

Trust: 0.6

db:CERT/CCid:HTTP://WWW.KB.CERT.ORG/VULS/ID/MORO-8QNJLE

Trust: 0.6

db:CERT/CCid:HTTP://WWW.KB.CERT.ORG/VULS/ID/MAPG-8NVRPY

Trust: 0.6

db:SECUNIAid:48453

Trust: 0.2

db:SECUNIAid:48403

Trust: 0.2

db:VULHUBid:VHN-55125

Trust: 0.1

db:PACKETSTORMid:111009

Trust: 0.1

db:PACKETSTORMid:111008

Trust: 0.1

sources: CERT/CC: VU#913483 // CNVD: CNVD-2012-1432 // CNVD: CNVD-2012-1434 // VULHUB: VHN-55125 // BID: 52566 // JVNDB: JVNDB-2012-001914 // PACKETSTORM: 111009 // PACKETSTORM: 111008 // CNNVD: CNNVD-201203-444 // NVD: CVE-2012-1844

REFERENCES

url:http://www.kb.cert.org/vuls/id/913483

Trust: 4.2

url:http://www.quantum.com/serviceandsupport/softwareanddocumentationdownloads/si500/index.aspx

Trust: 1.9

url:http://www-933.ibm.com/support/fixcentral/

Trust: 1.9

url:http://www.kb.cert.org/vuls/id/mapg-8nnkn8

Trust: 1.7

url:http://www.kb.cert.org/vuls/id/mapg-8nvrpy

Trust: 1.7

url:http://www.kb.cert.org/vuls/id/moro-8qnjle

Trust: 1.7

url:http://support.dell.com

Trust: 1.6

url:http://osvdb.org/80372

Trust: 1.1

url:https://exchange.xforce.ibmcloud.com/vulnerabilities/74322

Trust: 1.1

url:http://cwe.mitre.org/data/definitions/552.html

Trust: 0.8

url:http://cwe.mitre.org/data/definitions/200.html

Trust: 0.8

url:http://cwe.mitre.org/data/definitions/352.html

Trust: 0.8

url:http://cwe.mitre.org/data/definitions/259.html

Trust: 0.8

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2012-1844

Trust: 0.8

url:http://jvn.jp/cert/jvnvu913483/

Trust: 0.8

url:http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2012-1844

Trust: 0.8

url:http://dell.com

Trust: 0.3

url:http://secunia.com/psi_30_beta_launch

Trust: 0.2

url:http://secunia.com/vulnerability_intelligence/

Trust: 0.2

url:http://secunia.com/vulnerability_scanning/corporate/wsus_sccm_3rd_third_party_patching/

Trust: 0.2

url:http://secunia.com/advisories/secunia_security_advisories/

Trust: 0.2

url:http://secunia.com/advisories/about_secunia_advisories/

Trust: 0.2

url:http://secunia.com/vulnerability_scanning/personal/

Trust: 0.2

url:http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org

Trust: 0.2

url:http://secunia.com/advisories/48453/#comments

Trust: 0.1

url:https://ca.secunia.com/?page=viewadvisory&vuln_id=48453

Trust: 0.1

url:http://secunia.com/advisories/48453/

Trust: 0.1

url:http://secunia.com/advisories/48403/

Trust: 0.1

url:https://ca.secunia.com/?page=viewadvisory&vuln_id=48403

Trust: 0.1

url:http://secunia.com/advisories/48403/#comments

Trust: 0.1

sources: CERT/CC: VU#913483 // CNVD: CNVD-2012-1432 // CNVD: CNVD-2012-1434 // VULHUB: VHN-55125 // BID: 52566 // JVNDB: JVNDB-2012-001914 // PACKETSTORM: 111009 // PACKETSTORM: 111008 // CNNVD: CNNVD-201203-444 // NVD: CVE-2012-1844

CREDITS

NOAA CIRT

Trust: 0.3

sources: BID: 52566

SOURCES

db:CERT/CCid:VU#913483
db:CNVDid:CNVD-2012-1432
db:CNVDid:CNVD-2012-1434
db:VULHUBid:VHN-55125
db:BIDid:52566
db:JVNDBid:JVNDB-2012-001914
db:PACKETSTORMid:111009
db:PACKETSTORMid:111008
db:CNNVDid:CNNVD-201203-444
db:NVDid:CVE-2012-1844

LAST UPDATE DATE

2025-04-11T20:28:13.770000+00:00


SOURCES UPDATE DATE

db:CERT/CCid:VU#913483date:2014-07-29T00:00:00
db:CNVDid:CNVD-2012-1432date:2012-03-23T00:00:00
db:CNVDid:CNVD-2012-1434date:2012-03-23T00:00:00
db:VULHUBid:VHN-55125date:2018-01-10T00:00:00
db:BIDid:52566date:2013-03-13T17:25:00
db:JVNDBid:JVNDB-2012-001914date:2012-03-26T00:00:00
db:CNNVDid:CNNVD-201203-444date:2012-03-23T00:00:00
db:NVDid:CVE-2012-1844date:2025-04-11T00:51:21.963

SOURCES RELEASE DATE

db:CERT/CCid:VU#913483date:2012-03-19T00:00:00
db:CNVDid:CNVD-2012-1432date:2012-03-23T00:00:00
db:CNVDid:CNVD-2012-1434date:2012-03-23T00:00:00
db:VULHUBid:VHN-55125date:2012-03-22T00:00:00
db:BIDid:52566date:2012-03-19T00:00:00
db:JVNDBid:JVNDB-2012-001914date:2012-03-26T00:00:00
db:PACKETSTORMid:111009date:2012-03-20T04:06:39
db:PACKETSTORMid:111008date:2012-03-20T04:06:35
db:CNNVDid:CNNVD-201203-444date:2012-03-23T00:00:00
db:NVDid:CVE-2012-1844date:2012-03-22T10:17:11.127