ID

VAR-201208-0747


TITLE

IOServer Remote Directory Traversal Vulnerability

Trust: 1.0

sources: IVD: 7d764e20-463f-11e9-8a6c-000c29342cb1 // IVD: 41afb5ba-1f5b-11e6-abef-000c29c66e3d // CNVD: CNVD-2012-7652

DESCRIPTION

IOServer is an industrial control software running on Windows that includes a built-in web server to support XML server functionality. Before IOServer 1.0.19.0 version did not correctly filter the URL, the input is used to display the file, and any file content can be downloaded and leaked through the directory traversal sequence. Successful exploitation of this vulnerability requires the \"XML Server\" to be enabled. IOServer is prone to a directory-traversal vulnerability because it fails to sufficiently sanitize user-supplied input. A remote attacker could exploit this vulnerability using directory-traversal strings (such as '../') to access arbitrary files within or outside of the XML server root directory. This could help the attacker launch further attacks. IOServer 1.0.18.0 and prior versions are vulnerable

Trust: 1.17

sources: CNVD: CNVD-2012-7652 // BID: 55093 // IVD: 7d764e20-463f-11e9-8a6c-000c29342cb1 // IVD: 41afb5ba-1f5b-11e6-abef-000c29c66e3d

IOT TAXONOMY

category:['ICS']sub_category: -

Trust: 1.0

sources: IVD: 7d764e20-463f-11e9-8a6c-000c29342cb1 // IVD: 41afb5ba-1f5b-11e6-abef-000c29c66e3d // CNVD: CNVD-2012-7652

AFFECTED PRODUCTS

vendor:ioservermodel:ioserverscope:eqversion:1.0.18.0

Trust: 0.6

vendor:ioservermodel: - scope:eqversion:*

Trust: 0.4

vendor:ioservermodel: - scope:eqversion:1.0.18.0

Trust: 0.4

sources: IVD: 7d764e20-463f-11e9-8a6c-000c29342cb1 // IVD: 41afb5ba-1f5b-11e6-abef-000c29c66e3d // CNVD: CNVD-2012-7652

CVSS

SEVERITY

CVSSV2

CVSSV3

CNVD: CNVD-2012-7652
value: MEDIUM

Trust: 0.6

IVD: 7d764e20-463f-11e9-8a6c-000c29342cb1
value: MEDIUM

Trust: 0.2

IVD: 41afb5ba-1f5b-11e6-abef-000c29c66e3d
value: MEDIUM

Trust: 0.2

CNVD: CNVD-2012-7652
severity: MEDIUM
baseScore: 5.0
vectorString: AV:N/AC:L/AU:N/C:P/I:N/A:N
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: NONE
availabilityImpact: NONE
exploitabilityScore: 10.0
impactScore: 2.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.6

IVD: 7d764e20-463f-11e9-8a6c-000c29342cb1
severity: MEDIUM
baseScore: 5.0
vectorString: AV:N/AC:L/AU:N/C:P/I:N/A:N
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: NONE
availabilityImpact: NONE
exploitabilityScore: 10.0
impactScore: 2.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.9 [IVD]

Trust: 0.2

IVD: 41afb5ba-1f5b-11e6-abef-000c29c66e3d
severity: MEDIUM
baseScore: 5.0
vectorString: AV:N/AC:L/AU:N/C:P/I:N/A:N
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: NONE
availabilityImpact: NONE
exploitabilityScore: 10.0
impactScore: 2.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.9 [IVD]

Trust: 0.2

sources: IVD: 7d764e20-463f-11e9-8a6c-000c29342cb1 // IVD: 41afb5ba-1f5b-11e6-abef-000c29c66e3d // CNVD: CNVD-2012-7652

THREAT TYPE

remote

Trust: 0.6

sources: CNNVD: CNNVD-201210-666

TYPE

Path traversal

Trust: 0.8

sources: IVD: 41afb5ba-1f5b-11e6-abef-000c29c66e3d // CNNVD: CNNVD-201210-666

EXTERNAL IDS

db:BIDid:55093

Trust: 1.5

db:CNVDid:CNVD-2012-7652

Trust: 1.0

db:CNNVDid:CNNVD-201210-666

Trust: 0.6

db:IVDid:7D764E20-463F-11E9-8A6C-000C29342CB1

Trust: 0.2

db:IVDid:41AFB5BA-1F5B-11E6-ABEF-000C29C66E3D

Trust: 0.2

sources: IVD: 7d764e20-463f-11e9-8a6c-000c29342cb1 // IVD: 41afb5ba-1f5b-11e6-abef-000c29c66e3d // CNVD: CNVD-2012-7652 // BID: 55093 // CNNVD: CNNVD-201210-666

REFERENCES

url:http://www.securityfocus.com/bid/55093/info

Trust: 0.6

url:http://www.securityfocus.com/bid/55093

Trust: 0.6

sources: CNVD: CNVD-2012-7652 // CNNVD: CNNVD-201210-666

CREDITS

hinge

Trust: 0.9

sources: BID: 55093 // CNNVD: CNNVD-201210-666

SOURCES

db:IVDid:7d764e20-463f-11e9-8a6c-000c29342cb1
db:IVDid:41afb5ba-1f5b-11e6-abef-000c29c66e3d
db:CNVDid:CNVD-2012-7652
db:BIDid:55093
db:CNNVDid:CNNVD-201210-666

LAST UPDATE DATE

2022-05-17T02:02:37.290000+00:00


SOURCES UPDATE DATE

db:CNVDid:CNVD-2012-7652date:2012-08-17T00:00:00
db:BIDid:55093date:2012-08-17T00:00:00
db:CNNVDid:CNNVD-201210-666date:2012-10-29T00:00:00

SOURCES RELEASE DATE

db:IVDid:7d764e20-463f-11e9-8a6c-000c29342cb1date:2012-08-17T00:00:00
db:IVDid:41afb5ba-1f5b-11e6-abef-000c29c66e3ddate:2012-08-17T00:00:00
db:CNVDid:CNVD-2012-7652date:2012-08-17T00:00:00
db:BIDid:55093date:2012-08-17T00:00:00
db:CNNVDid:CNNVD-201210-666date:2012-08-17T00:00:00