ID

VAR-201203-0257


CVE

CVE-2012-1841


TITLE

Quantum Scalar i500, Dell ML6000 and IBM TS3310 tape libraries web interface and preconfigured password vulnerabilities

Trust: 0.8

sources: CERT/CC: VU#913483

DESCRIPTION

Absolute path traversal vulnerability in logShow.htm on the Quantum Scalar i500 tape library with firmware before i7.0.3 (604G.GS00100), also distributed as the Dell ML6000 tape library with firmware before A20-00 (590G.GS00100), allows remote attackers to read arbitrary files via a full pathname in the file parameter. Cross scripting and preconfigured password vulnerabilities have been reported to exist in the Quantum Scalar i500, Dell ML6000 and IBM TS3310 tape libraries. (2) http://device/checkQKMProg.htm There is a cross-site scripting vulnerability that allows you to get the session ID. (3) The POST parameter executes any command with the ROOT user. An information-disclosure vulnerability 2. A cross-site request-forgery vulnerability 4. A security-bypass vulnerability An attacker may leverage these issues to execute arbitrary script code in the browser of an unsuspecting user in the context of the affected site. This may let the attacker steal cookie-based authentication credentials and launch other attacks. The information-disclosure vulnerability can allow the attacker to obtain sensitive information that may aid in launching further attacks. Exploiting the cross-site request-forgery may allow a remote attacker to perform certain administrative actions and gain unauthorized access to the affected application. Other attacks are also possible. Attackers can exploit a password weakness issue to bypass security restrictions to obtain sensitive information or perform unauthorized actions; this may aid in launching further attacks. ---------------------------------------------------------------------- Become a PSI 3.0 beta tester! Test-drive the new beta version and tell us what you think about its extended automatic update function and significantly enhanced user-interface. Download it here! http://secunia.com/psi_30_beta_launch ---------------------------------------------------------------------- TITLE: Quantum Scalar i500 Multiple Vulnerabilities SECUNIA ADVISORY ID: SA48403 VERIFY ADVISORY: Secunia.com http://secunia.com/advisories/48403/ Customer Area (Credentials Required) https://ca.secunia.com/?page=viewadvisory&vuln_id=48403 RELEASE DATE: 2012-03-20 DISCUSS ADVISORY: http://secunia.com/advisories/48403/#comments AVAILABLE ON SITE AND IN CUSTOMER AREA: * Last Update * Popularity * Comments * Criticality Level * Impact * Where * Solution Status * Operating System / Software * CVE Reference(s) http://secunia.com/advisories/48403/ ONLY AVAILABLE IN CUSTOMER AREA: * Authentication Level * Report Reliability * Secunia PoC * Secunia Analysis * Systems Affected * Approve Distribution * Remediation Status * Secunia CVSS Score * CVSS https://ca.secunia.com/?page=viewadvisory&vuln_id=48403 ONLY AVAILABLE WITH SECUNIA CSI AND SECUNIA PSI: * AUTOMATED SCANNING http://secunia.com/vulnerability_scanning/personal/ http://secunia.com/vulnerability_scanning/corporate/wsus_sccm_3rd_third_party_patching/ DESCRIPTION: Multiple vulnerabilities have been reported in Quantum Scalar i500, which can be exploited by malicious people to disclose potentially sensitive information and conduct cross-site scripting and request forgery attacks. 1) Input passed via e.g. the "file" parameter to logShow.html is not properly verified before being used to display files. This can be exploited to disclose the contents of arbitrary files via directory traversal sequences. 2) Certain input passed via checkQKMProg.htm is not properly sanitised before being returned to the user. This can be exploited to e.g. SOLUTION: Update to firmware version i7.0.3 (604G.GS00100) or later. PROVIDED AND/OR DISCOVERED BY: US-CERT credits NOAA CIRT. ORIGINAL ADVISORY: US-CERT: http://www.kb.cert.org/vuls/id/913483 OTHER REFERENCES: Further details available in Customer Area: http://secunia.com/vulnerability_intelligence/ DEEP LINKS: Further details available in Customer Area: http://secunia.com/vulnerability_intelligence/ EXTENDED DESCRIPTION: Further details available in Customer Area: http://secunia.com/vulnerability_intelligence/ EXTENDED SOLUTION: Further details available in Customer Area: http://secunia.com/vulnerability_intelligence/ EXPLOIT: Further details available in Customer Area: http://secunia.com/vulnerability_intelligence/ ---------------------------------------------------------------------- About: This Advisory was delivered by Secunia as a free service to help private users keeping their systems up to date against the latest vulnerabilities. Subscribe: http://secunia.com/advisories/secunia_security_advisories/ Definitions: (Criticality, Where etc.) http://secunia.com/advisories/about_secunia_advisories/ Please Note: Secunia recommends that you verify all advisories you receive by clicking the link. Secunia NEVER sends attached files with advisories. Secunia does not advise people to install third party patches, only use those supplied by the vendor. ---------------------------------------------------------------------- Unsubscribe: Secunia Security Advisories http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org ----------------------------------------------------------------------

Trust: 3.96

sources: NVD: CVE-2012-1841 // CERT/CC: VU#913483 // JVNDB: JVNDB-2012-001911 // CNVD: CNVD-2012-1432 // CNVD: CNVD-2012-1434 // BID: 52566 // VULHUB: VHN-55122 // PACKETSTORM: 111009 // PACKETSTORM: 111008

IOT TAXONOMY

category:['Network device']sub_category: -

Trust: 1.2

sources: CNVD: CNVD-2012-1432 // CNVD: CNVD-2012-1434

AFFECTED PRODUCTS

vendor:dellmodel:powervault ml6000scope:eqversion:585g.gs003

Trust: 1.6

vendor:quantummodel:scalar i500scope:eqversion:0

Trust: 1.5

vendor:dellmodel:ml6000scope:eqversion:0

Trust: 1.5

vendor:ibmmodel:ts3310scope:eqversion:0

Trust: 1.5

vendor:dellmodel:powervault ml6030scope:eqversion:23u

Trust: 1.0

vendor:quantummodel:scalar i500scope:eqversion:i7

Trust: 1.0

vendor:quantummodel:scalar i500scope:lteversion:i7.0.2

Trust: 1.0

vendor:quantummodel:scalar i500scope:eqversion:i3.1

Trust: 1.0

vendor:quantummodel:scalar i500scope:eqversion:i7.0.1

Trust: 1.0

vendor:quantummodel:scalar i500scope:eqversion:i3

Trust: 1.0

vendor:dellmodel:powervault ml6000scope:eqversion:41u

Trust: 1.0

vendor:quantummodel:scalar i500scope:eqversion:23u

Trust: 1.0

vendor:quantummodel:scalar i500scope:eqversion:i2

Trust: 1.0

vendor:quantummodel:scalar i500scope:eqversion:5u

Trust: 1.0

vendor:quantummodel:scalar i500scope:eqversion:i4

Trust: 1.0

vendor:quantummodel:scalar i500scope:eqversion:i5

Trust: 1.0

vendor:quantummodel:scalar i500scope:eqversion:i6.1

Trust: 1.0

vendor:quantummodel:scalar i500scope:eqversion:i6

Trust: 1.0

vendor:quantummodel:scalar i500scope:eqversion:sp4.2

Trust: 1.0

vendor:dellmodel:powervault ml6020scope:eqversion:14u

Trust: 1.0

vendor:dellmodel:powervault ml6010scope:eqversion:5u

Trust: 1.0

vendor:quantummodel:scalar i500scope:eqversion:sp4

Trust: 1.0

vendor:dellmodel:powervault ml6000scope:eqversion:32u

Trust: 1.0

vendor:quantummodel:scalar i500scope:eqversion:i5.1

Trust: 1.0

vendor:quantummodel:scalar i500scope:eqversion:14u

Trust: 1.0

vendor:dell computermodel: - scope: - version: -

Trust: 0.8

vendor:ibmmodel: - scope: - version: -

Trust: 0.8

vendor:quantummodel: - scope: - version: -

Trust: 0.8

vendor:quantummodel:scalar i500scope:ltversion:14u firmware i7.0.3 (604g.gs00100)

Trust: 0.8

vendor:quantummodel:scalar i500scope:ltversion:23u firmware i7.0.3 (604g.gs00100)

Trust: 0.8

vendor:quantummodel:scalar i500scope:ltversion:5u firmware i7.0.3 (604g.gs00100)

Trust: 0.8

vendor:quantummodel:scalar i500scope:ltversion:i7.0.3 (604g.gs00100)

Trust: 0.8

vendor:dellmodel:powervault ml6000scope:ltversion:32u firmware a20-00 (590g.gs00100)

Trust: 0.8

vendor:dellmodel:powervault ml6000scope:ltversion:41u firmware a20-00 (590g.gs00100)

Trust: 0.8

vendor:dellmodel:powervault ml6000scope:ltversion:a20-00 (590g.gs00100)

Trust: 0.8

vendor:dellmodel:powervault ml6010scope:ltversion:5u firmware a20-00 (590g.gs00100)

Trust: 0.8

vendor:dellmodel:powervault ml6020scope:ltversion:14u firmware a20-00 (590g.gs00100)

Trust: 0.8

vendor:dellmodel:powervault ml6030scope:ltversion:23u firmware a20-00 (590g.gs00100)

Trust: 0.8

vendor:quantummodel:scalar i500 i7.0.3scope:neversion: -

Trust: 0.3

vendor:ibmmodel:ts3310 r6cscope:neversion: -

Trust: 0.3

vendor:dellmodel:ml6000 a20-00scope:neversion: -

Trust: 0.3

sources: CERT/CC: VU#913483 // CNVD: CNVD-2012-1432 // CNVD: CNVD-2012-1434 // BID: 52566 // JVNDB: JVNDB-2012-001911 // CNNVD: CNNVD-201203-441 // NVD: CVE-2012-1841

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2012-1841
value: MEDIUM

Trust: 1.0

NVD: CVE-2012-1841
value: MEDIUM

Trust: 0.8

CNNVD: CNNVD-201203-441
value: MEDIUM

Trust: 0.6

VULHUB: VHN-55122
value: MEDIUM

Trust: 0.1

nvd@nist.gov: CVE-2012-1841
severity: MEDIUM
baseScore: 5.0
vectorString: AV:N/AC:L/AU:N/C:P/I:N/A:N
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: NONE
availabilityImpact: NONE
exploitabilityScore: 10.0
impactScore: 2.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.8

VULHUB: VHN-55122
severity: MEDIUM
baseScore: 5.0
vectorString: AV:N/AC:L/AU:N/C:P/I:N/A:N
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: NONE
availabilityImpact: NONE
exploitabilityScore: 10.0
impactScore: 2.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.1

sources: VULHUB: VHN-55122 // JVNDB: JVNDB-2012-001911 // CNNVD: CNNVD-201203-441 // NVD: CVE-2012-1841

PROBLEMTYPE DATA

problemtype:CWE-22

Trust: 1.9

sources: VULHUB: VHN-55122 // JVNDB: JVNDB-2012-001911 // NVD: CVE-2012-1841

THREAT TYPE

remote

Trust: 0.6

sources: CNNVD: CNNVD-201203-441

TYPE

path traversal

Trust: 0.6

sources: CNNVD: CNNVD-201203-441

CONFIGURATIONS

sources: JVNDB: JVNDB-2012-001911

PATCH

title:Welcome to Dell Technical Supporturl:http://support.dell.com/

Trust: 0.8

title:Scalar i500url:http://www.quantum.com/ServiceandSupport/SoftwareandDocumentationDownloads/SI500/Index.aspx

Trust: 0.8

title:Patch for Quantum Scalar i500, Dell ML6000 and IBM TS3310 Enterprise Tape Library WEB Interface Cross-Site Scripting Vulnerabilityurl:https://www.cnvd.org.cn/patchInfo/show/14191

Trust: 0.6

title:Quantum Scalar i500, Dell ML6000 and IBM TS3310 Tape Library Preconfigured Password Vulnerability Patchurl:https://www.cnvd.org.cn/patchInfo/show/14192

Trust: 0.6

sources: CNVD: CNVD-2012-1432 // CNVD: CNVD-2012-1434 // JVNDB: JVNDB-2012-001911

EXTERNAL IDS

db:CERT/CCid:VU#913483

Trust: 5.0

db:NVDid:CVE-2012-1841

Trust: 2.8

db:BIDid:52566

Trust: 1.5

db:SECUNIAid:48453

Trust: 1.3

db:SECUNIAid:48403

Trust: 1.3

db:OSVDBid:80226

Trust: 1.1

db:JVNDBid:JVNDB-2012-001911

Trust: 0.8

db:CNNVDid:CNNVD-201203-441

Trust: 0.7

db:CNVDid:CNVD-2012-1432

Trust: 0.6

db:CNVDid:CNVD-2012-1434

Trust: 0.6

db:CERT/CCid:HTTP://WWW.KB.CERT.ORG/VULS/ID/MAPG-8NVRPY

Trust: 0.6

db:CERT/CCid:HTTP://WWW.KB.CERT.ORG/VULS/ID/MAPG-8NNKN8

Trust: 0.6

db:VULHUBid:VHN-55122

Trust: 0.1

db:PACKETSTORMid:111009

Trust: 0.1

db:PACKETSTORMid:111008

Trust: 0.1

sources: CERT/CC: VU#913483 // CNVD: CNVD-2012-1432 // CNVD: CNVD-2012-1434 // VULHUB: VHN-55122 // BID: 52566 // JVNDB: JVNDB-2012-001911 // PACKETSTORM: 111009 // PACKETSTORM: 111008 // CNNVD: CNNVD-201203-441 // NVD: CVE-2012-1841

REFERENCES

url:http://www.kb.cert.org/vuls/id/913483

Trust: 4.2

url:http://www.quantum.com/serviceandsupport/softwareanddocumentationdownloads/si500/index.aspx

Trust: 1.9

url:http://www-933.ibm.com/support/fixcentral/

Trust: 1.9

url:http://www.kb.cert.org/vuls/id/mapg-8nnkn8

Trust: 1.7

url:http://www.kb.cert.org/vuls/id/mapg-8nvrpy

Trust: 1.7

url:http://support.dell.com

Trust: 1.6

url:http://osvdb.org/80226

Trust: 1.1

url:http://secunia.com/advisories/48403

Trust: 1.1

url:http://secunia.com/advisories/48453

Trust: 1.1

url:http://cwe.mitre.org/data/definitions/552.html

Trust: 0.8

url:http://cwe.mitre.org/data/definitions/200.html

Trust: 0.8

url:http://cwe.mitre.org/data/definitions/352.html

Trust: 0.8

url:http://cwe.mitre.org/data/definitions/259.html

Trust: 0.8

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2012-1841

Trust: 0.8

url:http://jvn.jp/cert/jvnvu913483/

Trust: 0.8

url:http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2012-1841

Trust: 0.8

url:http://dell.com

Trust: 0.3

url:http://secunia.com/psi_30_beta_launch

Trust: 0.2

url:http://secunia.com/vulnerability_intelligence/

Trust: 0.2

url:http://secunia.com/vulnerability_scanning/corporate/wsus_sccm_3rd_third_party_patching/

Trust: 0.2

url:http://secunia.com/advisories/secunia_security_advisories/

Trust: 0.2

url:http://secunia.com/advisories/about_secunia_advisories/

Trust: 0.2

url:http://secunia.com/vulnerability_scanning/personal/

Trust: 0.2

url:http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org

Trust: 0.2

url:http://secunia.com/advisories/48453/#comments

Trust: 0.1

url:https://ca.secunia.com/?page=viewadvisory&vuln_id=48453

Trust: 0.1

url:http://secunia.com/advisories/48453/

Trust: 0.1

url:http://secunia.com/advisories/48403/

Trust: 0.1

url:https://ca.secunia.com/?page=viewadvisory&vuln_id=48403

Trust: 0.1

url:http://secunia.com/advisories/48403/#comments

Trust: 0.1

sources: CERT/CC: VU#913483 // CNVD: CNVD-2012-1432 // CNVD: CNVD-2012-1434 // VULHUB: VHN-55122 // BID: 52566 // JVNDB: JVNDB-2012-001911 // PACKETSTORM: 111009 // PACKETSTORM: 111008 // CNNVD: CNNVD-201203-441 // NVD: CVE-2012-1841

CREDITS

NOAA CIRT

Trust: 0.3

sources: BID: 52566

SOURCES

db:CERT/CCid:VU#913483
db:CNVDid:CNVD-2012-1432
db:CNVDid:CNVD-2012-1434
db:VULHUBid:VHN-55122
db:BIDid:52566
db:JVNDBid:JVNDB-2012-001911
db:PACKETSTORMid:111009
db:PACKETSTORMid:111008
db:CNNVDid:CNNVD-201203-441
db:NVDid:CVE-2012-1841

LAST UPDATE DATE

2025-04-11T21:12:40.908000+00:00


SOURCES UPDATE DATE

db:CERT/CCid:VU#913483date:2014-07-29T00:00:00
db:CNVDid:CNVD-2012-1432date:2012-03-23T00:00:00
db:CNVDid:CNVD-2012-1434date:2012-03-23T00:00:00
db:VULHUBid:VHN-55122date:2018-01-10T00:00:00
db:BIDid:52566date:2013-03-13T17:25:00
db:JVNDBid:JVNDB-2012-001911date:2012-03-26T00:00:00
db:CNNVDid:CNNVD-201203-441date:2012-03-23T00:00:00
db:NVDid:CVE-2012-1841date:2025-04-11T00:51:21.963

SOURCES RELEASE DATE

db:CERT/CCid:VU#913483date:2012-03-19T00:00:00
db:CNVDid:CNVD-2012-1432date:2012-03-23T00:00:00
db:CNVDid:CNVD-2012-1434date:2012-03-23T00:00:00
db:VULHUBid:VHN-55122date:2012-03-22T00:00:00
db:BIDid:52566date:2012-03-19T00:00:00
db:JVNDBid:JVNDB-2012-001911date:2012-03-26T00:00:00
db:PACKETSTORMid:111009date:2012-03-20T04:06:39
db:PACKETSTORMid:111008date:2012-03-20T04:06:35
db:CNNVDid:CNNVD-201203-441date:2012-03-23T00:00:00
db:NVDid:CVE-2012-1841date:2012-03-22T10:17:11.003