ID

VAR-201208-0310


CVE

CVE-2012-4680


TITLE

IOServer Web Interface Directory Traversal Vulnerability

Trust: 0.8

sources: IVD: 775a9e7e-1f5a-11e6-abef-000c29c66e3d // CNVD: CNVD-2012-4378

DESCRIPTION

Directory traversal vulnerability in the XML Server in IOServer before 1.0.19.0, when the Root Directory pathname lacks a trailing \ (backslash) character, allows remote attackers to read arbitrary files or list arbitrary directories via a .. (dot dot) in a URI. ( Dot dot ) including URI Any file may be read through, or any directory may be listed. IOServer is an industrial control software running on windows. The WEB interface contained in the IOServer fails to properly filter the URL submitted by the user. To successfully exploit the vulnerability you need to enable \"XML Server\". ---------------------------------------------------------------------- The new Secunia CSI 6.0 is now available in beta! Seamless integration with your existing security solutions Sign-up to become a Beta tester: http://secunia.com/csi6beta ---------------------------------------------------------------------- TITLE: IOServer Web Interface Directory Traversal Vulnerability SECUNIA ADVISORY ID: SA50297 VERIFY ADVISORY: Secunia.com http://secunia.com/advisories/50297/ Customer Area (Credentials Required) https://ca.secunia.com/?page=viewadvisory&vuln_id=50297 RELEASE DATE: 2012-08-21 DISCUSS ADVISORY: http://secunia.com/advisories/50297/#comments AVAILABLE ON SITE AND IN CUSTOMER AREA: * Last Update * Popularity * Comments * Criticality Level * Impact * Where * Solution Status * Operating System / Software * CVE Reference(s) http://secunia.com/advisories/50297/ ONLY AVAILABLE IN CUSTOMER AREA: * Authentication Level * Report Reliability * Secunia PoC * Secunia Analysis * Systems Affected * Approve Distribution * Remediation Status * Secunia CVSS Score * CVSS https://ca.secunia.com/?page=viewadvisory&vuln_id=50297 ONLY AVAILABLE WITH SECUNIA CSI AND SECUNIA PSI: * AUTOMATED SCANNING http://secunia.com/vulnerability_scanning/personal/ http://secunia.com/vulnerability_scanning/corporate/wsus_sccm_3rd_third_party_patching/ DESCRIPTION: hinge has reported a vulnerability in IOServer, which can be exploited by malicious people to disclose certain sensitive information. Input appended to the URL is not properly sanitised before being used to display files. The vulnerability is reported in versions prior to 1.0.19.0. SOLUTION: Update to version 1.0.19.0. PROVIDED AND/OR DISCOVERED BY: hinge ORIGINAL ADVISORY: http://www.foofus.net/?page_id=616 OTHER REFERENCES: Further details available in Customer Area: http://secunia.com/vulnerability_intelligence/ DEEP LINKS: Further details available in Customer Area: http://secunia.com/vulnerability_intelligence/ EXTENDED DESCRIPTION: Further details available in Customer Area: http://secunia.com/vulnerability_intelligence/ EXTENDED SOLUTION: Further details available in Customer Area: http://secunia.com/vulnerability_intelligence/ EXPLOIT: Further details available in Customer Area: http://secunia.com/vulnerability_intelligence/ ---------------------------------------------------------------------- About: This Advisory was delivered by Secunia as a free service to help private users keeping their systems up to date against the latest vulnerabilities. Subscribe: http://secunia.com/advisories/secunia_security_advisories/ Definitions: (Criticality, Where etc.) http://secunia.com/advisories/about_secunia_advisories/ Please Note: Secunia recommends that you verify all advisories you receive by clicking the link. Secunia NEVER sends attached files with advisories. Secunia does not advise people to install third party patches, only use those supplied by the vendor. ---------------------------------------------------------------------- Unsubscribe: Secunia Security Advisories http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org ----------------------------------------------------------------------

Trust: 2.43

sources: NVD: CVE-2012-4680 // JVNDB: JVNDB-2012-003926 // CNVD: CNVD-2012-4378 // IVD: 775a9e7e-1f5a-11e6-abef-000c29c66e3d // PACKETSTORM: 115728

IOT TAXONOMY

category:['ICS']sub_category: -

Trust: 0.8

sources: IVD: 775a9e7e-1f5a-11e6-abef-000c29c66e3d // CNVD: CNVD-2012-4378

AFFECTED PRODUCTS

vendor:ioservermodel:ioserverscope:eqversion:1.0.18.0

Trust: 2.2

vendor:ioservermodel:ioserverscope:ltversion:1.0.19.0

Trust: 0.8

vendor:ioservermodel: - scope:eqversion:*

Trust: 0.2

vendor:ioservermodel: - scope:eqversion:1.0.18.0

Trust: 0.2

sources: IVD: 775a9e7e-1f5a-11e6-abef-000c29c66e3d // CNVD: CNVD-2012-4378 // JVNDB: JVNDB-2012-003926 // CNNVD: CNNVD-201208-569 // NVD: CVE-2012-4680

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2012-4680
value: MEDIUM

Trust: 1.0

NVD: CVE-2012-4680
value: MEDIUM

Trust: 0.8

CNNVD: CNNVD-201208-569
value: MEDIUM

Trust: 0.6

IVD: 775a9e7e-1f5a-11e6-abef-000c29c66e3d
value: MEDIUM

Trust: 0.2

nvd@nist.gov: CVE-2012-4680
severity: MEDIUM
baseScore: 4.3
vectorString: AV:N/AC:M/AU:N/C:P/I:N/A:N
accessVector: NETWORK
accessComplexity: MEDIUM
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: NONE
availabilityImpact: NONE
exploitabilityScore: 8.6
impactScore: 2.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.8

IVD: 775a9e7e-1f5a-11e6-abef-000c29c66e3d
severity: NONE
baseScore: NONE
vectorString: NONE
accessVector: NONE
accessComplexity: NONE
authentication: NONE
confidentialityImpact: NONE
integrityImpact: NONE
availabilityImpact: NONE
exploitabilityScore: NONE
impactScore: NONE
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: UNKNOWN

Trust: 0.2

sources: IVD: 775a9e7e-1f5a-11e6-abef-000c29c66e3d // JVNDB: JVNDB-2012-003926 // CNNVD: CNNVD-201208-569 // NVD: CVE-2012-4680

PROBLEMTYPE DATA

problemtype:CWE-22

Trust: 1.8

sources: JVNDB: JVNDB-2012-003926 // NVD: CVE-2012-4680

THREAT TYPE

remote

Trust: 0.6

sources: CNNVD: CNNVD-201208-569

TYPE

Path traversal

Trust: 0.8

sources: IVD: 775a9e7e-1f5a-11e6-abef-000c29c66e3d // CNNVD: CNNVD-201208-569

CONFIGURATIONS

sources: JVNDB: JVNDB-2012-003926

PATCH

title:Top Pageurl:http://www.ioserver.com

Trust: 0.8

title:Patch for IOServer Web Interface Directory Traversal Vulnerabilityurl:https://www.cnvd.org.cn/patchInfo/show/20272

Trust: 0.6

title:driver19url:http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=44393

Trust: 0.6

sources: CNVD: CNVD-2012-4378 // JVNDB: JVNDB-2012-003926 // CNNVD: CNNVD-201208-569

EXTERNAL IDS

db:NVDid:CVE-2012-4680

Trust: 2.4

db:ICS CERTid:ICSA-12-258-01

Trust: 1.8

db:SECUNIAid:50297

Trust: 1.7

db:CNVDid:CNVD-2012-4378

Trust: 0.8

db:JVNDBid:JVNDB-2012-003926

Trust: 0.8

db:NSFOCUSid:47142

Trust: 0.6

db:CNNVDid:CNNVD-201208-569

Trust: 0.6

db:IVDid:775A9E7E-1F5A-11E6-ABEF-000C29C66E3D

Trust: 0.2

db:PACKETSTORMid:115728

Trust: 0.1

sources: IVD: 775a9e7e-1f5a-11e6-abef-000c29c66e3d // CNVD: CNVD-2012-4378 // JVNDB: JVNDB-2012-003926 // PACKETSTORM: 115728 // CNNVD: CNNVD-201208-569 // NVD: CVE-2012-4680

REFERENCES

url:http://ics-cert.us-cert.gov/advisories/icsa-12-258-01

Trust: 1.8

url:http://www.foofus.net/?page_id=616

Trust: 1.1

url:http://secunia.com/advisories/50297

Trust: 1.0

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2012-4680

Trust: 0.8

url:http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2012-4680

Trust: 0.8

url:http://www.foofus.net/?page_id=616http

Trust: 0.6

url:http://www.nsfocus.net/vulndb/47142

Trust: 0.6

url:https://ca.secunia.com/?page=viewadvisory&vuln_id=50297

Trust: 0.1

url:http://secunia.com/advisories/50297/

Trust: 0.1

url:http://secunia.com/vulnerability_intelligence/

Trust: 0.1

url:http://secunia.com/advisories/secunia_security_advisories/

Trust: 0.1

url:http://secunia.com/advisories/50297/#comments

Trust: 0.1

url:http://secunia.com/vulnerability_scanning/corporate/wsus_sccm_3rd_third_party_patching/

Trust: 0.1

url:http://secunia.com/csi6beta

Trust: 0.1

url:http://secunia.com/vulnerability_scanning/personal/

Trust: 0.1

url:http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org

Trust: 0.1

url:http://secunia.com/advisories/about_secunia_advisories/

Trust: 0.1

sources: CNVD: CNVD-2012-4378 // JVNDB: JVNDB-2012-003926 // PACKETSTORM: 115728 // CNNVD: CNNVD-201208-569 // NVD: CVE-2012-4680

CREDITS

Secunia

Trust: 0.1

sources: PACKETSTORM: 115728

SOURCES

db:IVDid:775a9e7e-1f5a-11e6-abef-000c29c66e3d
db:CNVDid:CNVD-2012-4378
db:JVNDBid:JVNDB-2012-003926
db:PACKETSTORMid:115728
db:CNNVDid:CNNVD-201208-569
db:NVDid:CVE-2012-4680

LAST UPDATE DATE

2025-04-11T23:12:07.330000+00:00


SOURCES UPDATE DATE

db:CNVDid:CNVD-2012-4378date:2012-08-23T00:00:00
db:JVNDBid:JVNDB-2012-003926date:2013-12-19T00:00:00
db:CNNVDid:CNNVD-201208-569date:2020-07-14T00:00:00
db:NVDid:CVE-2012-4680date:2025-04-11T00:51:21.963

SOURCES RELEASE DATE

db:IVDid:775a9e7e-1f5a-11e6-abef-000c29c66e3ddate:2012-08-23T00:00:00
db:CNVDid:CNVD-2012-4378date:2012-08-23T00:00:00
db:JVNDBid:JVNDB-2012-003926date:2012-08-29T00:00:00
db:PACKETSTORMid:115728date:2012-08-21T03:04:38
db:CNNVDid:CNNVD-201208-569date:2012-08-29T00:00:00
db:NVDid:CVE-2012-4680date:2012-08-27T23:55:02.523