ID

VAR-201209-0218


CVE

CVE-2012-3011


TITLE

Fultek WinTr Scada Directory Traversal Vulnerability

Trust: 1.1

sources: IVD: 593eb838-2353-11e6-abef-000c29c66e3d // CNVD: CNVD-2012-5264 // BID: 55595

DESCRIPTION

Directory traversal vulnerability in the web server in Fultek WinTr Scada 4.0.5 and earlier allows remote attackers to read arbitrary files via a crafted request. Fultek WinTr Scada is a Turkish SCADA software. Fultek WinTr Scada is prone to a directory-traversal vulnerability because it fails to sufficiently sanitize user-supplied input data. Information obtained could aid in further attacks. WinTr Scada 4.0.5 is vulnerable; other versions may also be affected. ---------------------------------------------------------------------- The final version of the CSI 6.0 has been released. Find out why this is not just another Patch Management solution: http://secunia.com/blog/325/ ---------------------------------------------------------------------- TITLE: WinTR Unspecified Directory Traversal Vulnerability SECUNIA ADVISORY ID: SA50668 VERIFY ADVISORY: Secunia.com http://secunia.com/advisories/50668/ Customer Area (Credentials Required) https://ca.secunia.com/?page=viewadvisory&vuln_id=50668 RELEASE DATE: 2012-09-19 DISCUSS ADVISORY: http://secunia.com/advisories/50668/#comments AVAILABLE ON SITE AND IN CUSTOMER AREA: * Last Update * Popularity * Comments * Criticality Level * Impact * Where * Solution Status * Operating System / Software * CVE Reference(s) http://secunia.com/advisories/50668/ ONLY AVAILABLE IN CUSTOMER AREA: * Authentication Level * Report Reliability * Secunia PoC * Secunia Analysis * Systems Affected * Approve Distribution * Remediation Status * Secunia CVSS Score * CVSS https://ca.secunia.com/?page=viewadvisory&vuln_id=50668 ONLY AVAILABLE WITH SECUNIA CSI AND SECUNIA PSI: * AUTOMATED SCANNING http://secunia.com/vulnerability_scanning/personal/ http://secunia.com/vulnerability_scanning/corporate/wsus_sccm_3rd_third_party_patching/ DESCRIPTION: A vulnerability has been reported in WinTr, which can be exploited by malicious people to disclose potentially sensitive information. The vulnerability is reported in version 4.0.5 and prior. SOLUTION: No official solution is currently available. PROVIDED AND/OR DISCOVERED BY: ICS-CERT credits Daiki Fukumori, Cyber Defense Institute. ORIGINAL ADVISORY: ICS-CERT: http://www.us-cert.gov/control_systems/pdf/ICSA-12-262-01.pdf OTHER REFERENCES: Further details available in Customer Area: http://secunia.com/vulnerability_intelligence/ DEEP LINKS: Further details available in Customer Area: http://secunia.com/vulnerability_intelligence/ EXTENDED DESCRIPTION: Further details available in Customer Area: http://secunia.com/vulnerability_intelligence/ EXTENDED SOLUTION: Further details available in Customer Area: http://secunia.com/vulnerability_intelligence/ EXPLOIT: Further details available in Customer Area: http://secunia.com/vulnerability_intelligence/ ---------------------------------------------------------------------- About: This Advisory was delivered by Secunia as a free service to help private users keeping their systems up to date against the latest vulnerabilities. Subscribe: http://secunia.com/advisories/secunia_security_advisories/ Definitions: (Criticality, Where etc.) http://secunia.com/advisories/about_secunia_advisories/ Please Note: Secunia recommends that you verify all advisories you receive by clicking the link. Secunia NEVER sends attached files with advisories. Secunia does not advise people to install third party patches, only use those supplied by the vendor. ---------------------------------------------------------------------- Unsubscribe: Secunia Security Advisories http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org ----------------------------------------------------------------------

Trust: 2.7

sources: NVD: CVE-2012-3011 // JVNDB: JVNDB-2012-004572 // CNVD: CNVD-2012-5264 // BID: 55595 // IVD: 593eb838-2353-11e6-abef-000c29c66e3d // PACKETSTORM: 116675

IOT TAXONOMY

category:['ICS']sub_category: -

Trust: 0.8

sources: IVD: 593eb838-2353-11e6-abef-000c29c66e3d // CNVD: CNVD-2012-5264

AFFECTED PRODUCTS

vendor:fultekmodel:wintr scadascope:lteversion:4.0.5

Trust: 1.8

vendor:fultekmodel:wintr scadascope:eqversion:2.0.0

Trust: 1.6

vendor:fultekmodel:wintr scadascope:eqversion:2.5

Trust: 1.6

vendor:fultekmodel:wintr scadascope:lteversion:<=4.0.5

Trust: 0.6

vendor:fultekmodel:wintr scadascope:eqversion:4.0.5

Trust: 0.6

vendor:wintr scadamodel: - scope:eqversion:2.0.0

Trust: 0.2

vendor:wintr scadamodel: - scope:eqversion:2.5

Trust: 0.2

vendor:wintr scadamodel: - scope:eqversion:*

Trust: 0.2

sources: IVD: 593eb838-2353-11e6-abef-000c29c66e3d // CNVD: CNVD-2012-5264 // JVNDB: JVNDB-2012-004572 // CNNVD: CNNVD-201209-496 // NVD: CVE-2012-3011

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2012-3011
value: HIGH

Trust: 1.0

NVD: CVE-2012-3011
value: HIGH

Trust: 0.8

CNNVD: CNNVD-201209-496
value: HIGH

Trust: 0.6

IVD: 593eb838-2353-11e6-abef-000c29c66e3d
value: HIGH

Trust: 0.2

nvd@nist.gov: CVE-2012-3011
severity: HIGH
baseScore: 7.8
vectorString: AV:N/AC:L/AU:N/C:C/I:N/A:N
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: COMPLETE
integrityImpact: NONE
availabilityImpact: NONE
exploitabilityScore: 10.0
impactScore: 6.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.8

IVD: 593eb838-2353-11e6-abef-000c29c66e3d
severity: HIGH
baseScore: 7.8
vectorString: AV:N/AC:L/AU:N/C:C/I:N/A:N
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: COMPLETE
integrityImpact: NONE
availabilityImpact: NONE
exploitabilityScore: 10.0
impactScore: 6.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.9 [IVD]

Trust: 0.2

sources: IVD: 593eb838-2353-11e6-abef-000c29c66e3d // JVNDB: JVNDB-2012-004572 // CNNVD: CNNVD-201209-496 // NVD: CVE-2012-3011

PROBLEMTYPE DATA

problemtype:CWE-22

Trust: 1.8

sources: JVNDB: JVNDB-2012-004572 // NVD: CVE-2012-3011

THREAT TYPE

remote

Trust: 0.6

sources: CNNVD: CNNVD-201209-496

TYPE

Path traversal

Trust: 0.8

sources: IVD: 593eb838-2353-11e6-abef-000c29c66e3d // CNNVD: CNNVD-201209-496

CONFIGURATIONS

sources: JVNDB: JVNDB-2012-004572

PATCH

title:Top Pageurl:http://www.fultek.com.tr/ScadaEn.html

Trust: 0.8

sources: JVNDB: JVNDB-2012-004572

EXTERNAL IDS

db:NVDid:CVE-2012-3011

Trust: 3.5

db:ICS CERTid:ICSA-12-262-01

Trust: 2.5

db:SECUNIAid:50668

Trust: 1.2

db:CNVDid:CNVD-2012-5264

Trust: 0.8

db:CNNVDid:CNNVD-201209-496

Trust: 0.8

db:JVNDBid:JVNDB-2012-004572

Trust: 0.8

db:NSFOCUSid:47143

Trust: 0.6

db:BIDid:55595

Trust: 0.3

db:IVDid:593EB838-2353-11E6-ABEF-000C29C66E3D

Trust: 0.2

db:PACKETSTORMid:116675

Trust: 0.1

sources: IVD: 593eb838-2353-11e6-abef-000c29c66e3d // CNVD: CNVD-2012-5264 // BID: 55595 // JVNDB: JVNDB-2012-004572 // PACKETSTORM: 116675 // CNNVD: CNNVD-201209-496 // NVD: CVE-2012-3011

REFERENCES

url:http://www.us-cert.gov/control_systems/pdf/icsa-12-262-01.pdf

Trust: 2.5

url:http://secunia.com/advisories/50668

Trust: 1.0

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2012-3011

Trust: 0.8

url:http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2012-3011

Trust: 0.8

url:http://www.nsfocus.net/vulndb/47143

Trust: 0.6

url:https://ca.secunia.com/?page=viewadvisory&vuln_id=50668

Trust: 0.1

url:http://secunia.com/vulnerability_intelligence/

Trust: 0.1

url:http://secunia.com/vulnerability_scanning/corporate/wsus_sccm_3rd_third_party_patching/

Trust: 0.1

url:http://secunia.com/advisories/secunia_security_advisories/

Trust: 0.1

url:http://secunia.com/vulnerability_scanning/personal/

Trust: 0.1

url:http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org

Trust: 0.1

url:http://secunia.com/advisories/50668/

Trust: 0.1

url:http://secunia.com/blog/325/

Trust: 0.1

url:http://secunia.com/advisories/50668/#comments

Trust: 0.1

url:http://secunia.com/advisories/about_secunia_advisories/

Trust: 0.1

sources: CNVD: CNVD-2012-5264 // JVNDB: JVNDB-2012-004572 // PACKETSTORM: 116675 // CNNVD: CNNVD-201209-496 // NVD: CVE-2012-3011

CREDITS

vendor

Trust: 0.6

sources: CNNVD: CNNVD-201209-496

SOURCES

db:IVDid:593eb838-2353-11e6-abef-000c29c66e3d
db:CNVDid:CNVD-2012-5264
db:BIDid:55595
db:JVNDBid:JVNDB-2012-004572
db:PACKETSTORMid:116675
db:CNNVDid:CNNVD-201209-496
db:NVDid:CVE-2012-3011

LAST UPDATE DATE

2025-04-11T22:49:25.165000+00:00


SOURCES UPDATE DATE

db:CNVDid:CNVD-2012-5264date:2012-09-20T00:00:00
db:BIDid:55595date:2012-09-18T00:00:00
db:JVNDBid:JVNDB-2012-004572date:2012-09-26T00:00:00
db:CNNVDid:CNNVD-201209-496date:2020-07-14T00:00:00
db:NVDid:CVE-2012-3011date:2025-04-11T00:51:21.963

SOURCES RELEASE DATE

db:IVDid:593eb838-2353-11e6-abef-000c29c66e3ddate:2012-09-20T00:00:00
db:CNVDid:CNVD-2012-5264date:2012-09-20T00:00:00
db:BIDid:55595date:2012-09-18T00:00:00
db:JVNDBid:JVNDB-2012-004572date:2012-09-26T00:00:00
db:PACKETSTORMid:116675date:2012-09-19T05:57:16
db:CNNVDid:CNNVD-201209-496date:2012-09-25T00:00:00
db:NVDid:CVE-2012-3011date:2012-09-25T11:07:46.110