ID

VAR-201312-0446


CVE

CVE-2013-6810


TITLE

EMC Connectrix Manager Converged Network Edition Vulnerabilities in arbitrary server that allow arbitrary code execution

Trust: 0.8

sources: JVNDB: JVNDB-2013-005505

DESCRIPTION

The server in Brocade Network Advisor before 12.1.0, as used in EMC Connectrix Manager Converged Network Edition (CMCNE), HP B-series SAN Network Advisor, and possibly other products, allows remote attackers to execute arbitrary code by using a servlet to upload an executable file. Authentication is not required to exploit this vulnerability. An attacker can leverage this directory traversal vulnerability into arbitrary code execution on the compromised server in the security context of the Administrator account. An attacker can use this to either disclose sensitive data, or to disclose information about the server that can be used in a subsequent attack. EMC Connectrix is a network switch solution that provides an interface to the Connectrix server to manage and protect devices. The title and technical details have been changed to better reflect the underlying components affected. -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 Note: the current version of the following document is available here: https://h20564.www2.hp.com/portal/site/hpsc/public/kb/ docDisplay?docId=emr_na-c04045640 SUPPORT COMMUNICATION - SECURITY BULLETIN Document ID: c04045640 Version: 1 HPSBHF02953 rev.1 - HP B-series SAN Network Advisor, Remote Code Execution NOTICE: The information in this Security Bulletin should be acted upon as soon as possible. Release Date: 2013-12-16 Last Updated: 2013-12-16 Potential Security Impact: Remote code execution Source: Hewlett-Packard Company, HP Software Security Response Team VULNERABILITY SUMMARY A potential security vulnerability has been identified with HP B-series SAN Network Advisor. The vulnerability could be exploited remotely resulting in code execution. References: CVE-2013-6810 (BROCADE TSB 2013-176-A, SSRT101392) SUPPORTED SOFTWARE VERSIONS*: ONLY impacted versions are listed. HP B-series SAN Network Advisor Enterprise Software v12.0.x HP B-series SAN Network Advisor Professional Plus Software v12.0.x HP B-series SAN Network Advisor Professional Plus Upgrade Software v12.0.x BACKGROUND CVSS 2.0 Base Metrics =========================================================== Reference Base Vector Base Score CVE-2013-6810 (AV:N/AC:L/Au:N/C:C/I:C/A:C) 10.0 =========================================================== Information on CVSS is documented in HP Customer Notice: HPSN-2008-002 RESOLUTION HP has made the following updates available to resolve the vulnerability. HP B-series SAN Network Advisor Enterprise Software v12.1.1 HP B-series SAN Network Advisor Professional Plus Software v12.1.1 HP B-series SAN Network Advisor Professional Plus Upgrade Software v12.1.1 1) Go to http://www.hp.com/support/downloads. 2) Click on "Storage", "Storage Networking", and then "StoreFabric B-series Switches". 3) Click on the link for the appropriate switch, and then select your product. 4) Select under "Drivers, Software & Firmware" and then select your switch. 5) Click on "Cross operating system (BIOS, Firmware, Diagnostics, etc.)". 6) Click on "Application". 7) In the "Description" column of the table, click on "HP SAN B-series SAN Network Advisor" to download the current version. HISTORY Version:1 (rev.1) - 16 December 2013 Initial release Third Party Security Patches: Third party security patches that are to be installed on systems running HP software products should be applied in accordance with the customer's patch management policy. Support: For issues about implementing the recommendations of this Security Bulletin, contact normal HP Services support channel. For other issues about the content of this Security Bulletin, send e-mail to security-alert@hp.com. Report: To report a potential security vulnerability with any HP supported product, send Email to: security-alert@hp.com Subscribe: To initiate a subscription to receive future HP Security Bulletin alerts via Email: http://h41183.www4.hp.com/signup_alerts.php?jumpid=hpsc_secbulletins Security Bulletin Archive: A list of recently released Security Bulletins is available here: https://h20564.www2.hp.com/portal/site/hpsc/public/kb/secBullArchive/ Software Product Category: The Software Product Category is represented in the title by the two characters following HPSB. 3C = 3COM 3P = 3rd Party Software GN = HP General Software HF = HP Hardware and Firmware MP = MPE/iX MU = Multi-Platform Software NS = NonStop Servers OV = OpenVMS PI = Printing and Imaging PV = ProCurve ST = Storage Software TU = Tru64 UNIX UX = HP-UX Copyright 2013 Hewlett-Packard Development Company, L.P. Hewlett-Packard Company shall not be liable for technical or editorial errors or omissions contained herein. The information provided is provided "as is" without warranty of any kind. To the extent permitted by law, neither HP or its affiliates, subcontractors or suppliers will be liable for incidental,special or consequential damages including downtime cost; lost profits; damages relating to the procurement of substitute products or services; or damages for loss of data, or software restoration. The information in this document is subject to change without notice. Hewlett-Packard Company and the names of Hewlett-Packard products referenced herein are trademarks of Hewlett-Packard Company in the United States and other countries. Other product and company names mentioned herein may be trademarks of their respective owners. -----BEGIN PGP SIGNATURE----- Version: GnuPG v2.0.19 (GNU/Linux) iEYEARECAAYFAlKvPL4ACgkQ4B86/C0qfVmu1gCfQJ/IVzeCRa5EKtAfF5bzsNpY CJQAn0XuI2HuuPZ7+j7F/gzlL8U2NEew =K3ek -----END PGP SIGNATURE----- . Using these servlets, remote unauthenticated attackers could read and place files from/on the CMCNE server and execute them. Resolution: The following products contain the resolution to these issues: \x95 EMC Connectrix Manager Converged Network Edition (CMCNE) 12.1.2 or higher EMC strongly recommends all customers upgrade at the earliest opportunity. As a security best practice, customers are strongly advised to isolate the CMCNE server from external networks using VLANs and/or firewall rules only allowing authorized administrators to interact with the CMCNE server. Link to remedies: EMC Connectrix Manager Converged Network Edition (CMCNE) 12.1.2 downloads and documentation can be found at EMC Online Support: https://support.emc.com/products/23304_Connectrix-Manager-Converged-Network-Edition https://support.emc.com/downloads/120_Connectrix Credits: EMC would like to thank Andrea Micalizzi (aka rgod) working with Zero Day Initiative (http://www.zerodayinitiative.com) for reporting these issues. Read and use the information in this EMC Security Advisory to assist in avoiding any situation that might arise from the problems described herein. If you have any questions regarding this product alert, contact EMC Software Technical Support at 1-877-534-2867. For an explanation of Severity Ratings, refer to EMC Knowledgebase solution emc218831. EMC recommends all customers take into account both the base score and any relevant temporal and environmental scores which may impact the potential severity associated with particular security vulnerability. EMC Corporation distributes EMC Security Advisories, in order to bring to the attention of users of the affected EMC products, important security information. EMC recommends that all users determine the applicability of this information to their individual situations and take appropriate action. EMC disclaims all warranties, either express or implied, including the warranties of merchantability, fitness for a particular purpose, title and non-infringement. Some states do not allow the exclusion or limitation of liability for consequential or incidental damages, so the foregoing limitation may not apply

Trust: 6.48

sources: NVD: CVE-2013-6810 // JVNDB: JVNDB-2013-005505 // ZDI: ZDI-13-278 // ZDI: ZDI-13-283 // ZDI: ZDI-13-279 // ZDI: ZDI-13-280 // ZDI: ZDI-13-282 // ZDI: ZDI-13-281 // CNVD: CNVD-2013-15244 // BID: 64242 // VULMON: CVE-2013-6810 // PACKETSTORM: 124478 // PACKETSTORM: 124405

IOT TAXONOMY

category:['Network device']sub_category: -

Trust: 0.6

sources: CNVD: CNVD-2013-15244

AFFECTED PRODUCTS

vendor:emcmodel:connectrix manager converged network editionscope: - version: -

Trust: 4.2

vendor:emcmodel:connectrix managerscope:eqversion:11.2.1

Trust: 1.6

vendor:emcmodel:connectrix managerscope:eqversion:12.0.1

Trust: 1.6

vendor:emcmodel:connectrix managerscope:eqversion:12.0.3

Trust: 1.6

vendor:dell emc old emcmodel:connectrix managerscope:eqversion:converged network edition 11.2.1

Trust: 0.8

vendor:dell emc old emcmodel:connectrix managerscope:eqversion:converged network edition 12.0.1

Trust: 0.8

vendor:dell emc old emcmodel:connectrix managerscope:eqversion:converged network edition 12.0.3

Trust: 0.8

vendor:hewlett packardmodel:hp b-series san network advisorscope:eqversion:enterprise software 12.0.x

Trust: 0.8

vendor:hewlett packardmodel:hp b-series san network advisorscope:eqversion:professional 12.0.x

Trust: 0.8

vendor:hewlett packardmodel:hp b-series san network advisorscope:eqversion:professional plus upgrade software 12.0.x

Trust: 0.8

vendor:hewlett packardmodel:hp b-series san network advisorscope:eqversion:professional plus software 12.0.x

Trust: 0.8

vendor:emcmodel:connectrix managerscope:eqversion:12.x

Trust: 0.6

sources: ZDI: ZDI-13-278 // ZDI: ZDI-13-283 // ZDI: ZDI-13-279 // ZDI: ZDI-13-280 // ZDI: ZDI-13-282 // ZDI: ZDI-13-281 // CNVD: CNVD-2013-15244 // JVNDB: JVNDB-2013-005505 // CNNVD: CNNVD-201312-242 // NVD: CVE-2013-6810

CVSS

SEVERITY

CVSSV2

CVSSV3

ZDI: CVE-2013-6810
value: HIGH

Trust: 4.2

nvd@nist.gov: CVE-2013-6810
value: HIGH

Trust: 1.0

NVD: CVE-2013-6810
value: HIGH

Trust: 0.8

CNVD: CNVD-2013-15244
value: HIGH

Trust: 0.6

CNNVD: CNNVD-201312-242
value: CRITICAL

Trust: 0.6

VULMON: CVE-2013-6810
value: HIGH

Trust: 0.1

nvd@nist.gov: CVE-2013-6810
severity: HIGH
baseScore: 10.0
vectorString: AV:N/AC:L/AU:N/C:C/I:C/A:C
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: COMPLETE
integrityImpact: COMPLETE
availabilityImpact: COMPLETE
exploitabilityScore: 10.0
impactScore: 10.0
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 3.3

ZDI: CVE-2013-6810
severity: HIGH
baseScore: 9.3
vectorString: AV:N/AC:M/AU:N/C:C/I:C/A:C
accessVector: NETWORK
accessComplexity: MEDIUM
authentication: NONE
confidentialityImpact: COMPLETE
integrityImpact: COMPLETE
availabilityImpact: COMPLETE
exploitabilityScore: 8.6
impactScore: 10.0
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 2.1

ZDI: CVE-2013-6810
severity: HIGH
baseScore: 7.8
vectorString: AV:N/AC:L/AU:N/C:C/I:N/A:N
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: COMPLETE
integrityImpact: NONE
availabilityImpact: NONE
exploitabilityScore: 10.0
impactScore: 6.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.7

CNVD: CNVD-2013-15244
severity: HIGH
baseScore: 10.0
vectorString: AV:N/AC:L/AU:N/C:C/I:C/A:C
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: COMPLETE
integrityImpact: COMPLETE
availabilityImpact: COMPLETE
exploitabilityScore: 10.0
impactScore: 10.0
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.6

sources: ZDI: ZDI-13-278 // ZDI: ZDI-13-283 // ZDI: ZDI-13-279 // ZDI: ZDI-13-280 // ZDI: ZDI-13-282 // ZDI: ZDI-13-281 // CNVD: CNVD-2013-15244 // VULMON: CVE-2013-6810 // JVNDB: JVNDB-2013-005505 // CNNVD: CNNVD-201312-242 // NVD: CVE-2013-6810

PROBLEMTYPE DATA

problemtype:CWE-94

Trust: 1.8

sources: JVNDB: JVNDB-2013-005505 // NVD: CVE-2013-6810

THREAT TYPE

remote

Trust: 0.7

sources: PACKETSTORM: 124405 // CNNVD: CNNVD-201312-242

TYPE

code injection

Trust: 0.6

sources: CNNVD: CNNVD-201312-242

CONFIGURATIONS

sources: JVNDB: JVNDB-2013-005505

EXPLOIT AVAILABILITY

sources: VULMON: CVE-2013-6810

PATCH

title:EMC has issued an update to correct this vulnerability.url:http://my.brocade.com/wps/myportal/!ut/p/b1/04_SjzQ0MzEwM7S0sDDSj9CPykssy0xPLMnMz0vMAfGjzOKd3BzDjE2MjQ39vbycDTzdXYJCLb18jQx8zIAKIoEKDHAARwNC-sP1o_ArMYEqwGOFn0d-bqp-blSOpaeuoyIA_fi0nA!!/dl4/d5/L2dJQSEvUUt3QS80SmtFL1o2X0JGQVYzNDMzMU9KSkMwSUdEUlU5Sk0yMDcx/

Trust: 4.2

title:EMC Connectrix Manager Softwareurl:http://www.emc.com/collateral/software/data-sheet/l861-connectrix-manager.pdf

Trust: 0.8

title:CONNECTRIXurl:http://japan.emc.com/storage/connectrix/connectrix.htm#!

Trust: 0.8

title:HPSBHF02953 SSRT101392url:http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?lang=en&cc=us&objectID=c04045640

Trust: 0.8

title:Patch for Multiple Remote Code Execution Vulnerabilities in EMC Connectrix Manager Converged Network Editionurl:https://www.cnvd.org.cn/patchInfo/show/41744

Trust: 0.6

title:install1212url:http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=47291

Trust: 0.6

sources: ZDI: ZDI-13-278 // ZDI: ZDI-13-283 // ZDI: ZDI-13-279 // ZDI: ZDI-13-280 // ZDI: ZDI-13-282 // ZDI: ZDI-13-281 // CNVD: CNVD-2013-15244 // JVNDB: JVNDB-2013-005505 // CNNVD: CNNVD-201312-242

EXTERNAL IDS

db:NVDid:CVE-2013-6810

Trust: 7.8

db:ZDIid:ZDI-13-283

Trust: 1.8

db:EXPLOIT-DBid:42702

Trust: 1.1

db:EXPLOIT-DBid:42701

Trust: 1.1

db:SECUNIAid:56143

Trust: 1.1

db:SECTRACKid:1029485

Trust: 1.1

db:BIDid:64242

Trust: 0.9

db:JVNDBid:JVNDB-2013-005505

Trust: 0.8

db:ZDI_CANid:ZDI-CAN-1750

Trust: 0.7

db:ZDIid:ZDI-13-278

Trust: 0.7

db:ZDI_CANid:ZDI-CAN-1751

Trust: 0.7

db:ZDI_CANid:ZDI-CAN-1746

Trust: 0.7

db:ZDIid:ZDI-13-279

Trust: 0.7

db:ZDI_CANid:ZDI-CAN-1747

Trust: 0.7

db:ZDIid:ZDI-13-280

Trust: 0.7

db:ZDI_CANid:ZDI-CAN-1749

Trust: 0.7

db:ZDIid:ZDI-13-282

Trust: 0.7

db:ZDI_CANid:ZDI-CAN-1748

Trust: 0.7

db:ZDIid:ZDI-13-281

Trust: 0.7

db:SECUNIAid:56078

Trust: 0.6

db:CNVDid:CNVD-2013-15244

Trust: 0.6

db:BUGTRAQid:20131211 ESA-2013-089: EMC CONNECTRIX MANAGER CONVERGED NETWORK EDITION REMOTE CODE EXECUTION VULNERABILITIES

Trust: 0.6

db:CNNVDid:CNNVD-201312-242

Trust: 0.6

db:VULMONid:CVE-2013-6810

Trust: 0.1

db:PACKETSTORMid:124478

Trust: 0.1

db:PACKETSTORMid:124405

Trust: 0.1

sources: ZDI: ZDI-13-278 // ZDI: ZDI-13-283 // ZDI: ZDI-13-279 // ZDI: ZDI-13-280 // ZDI: ZDI-13-282 // ZDI: ZDI-13-281 // CNVD: CNVD-2013-15244 // VULMON: CVE-2013-6810 // BID: 64242 // JVNDB: JVNDB-2013-005505 // PACKETSTORM: 124478 // PACKETSTORM: 124405 // CNNVD: CNNVD-201312-242 // NVD: CVE-2013-6810

REFERENCES

url:http://my.brocade.com/wps/myportal/!ut/p/b1/04_sjzq0mzewm7s0sddsj9cpykssy0xplmnmz0vmafgjzokd3bzdje2mjq39vbycdtzdxyjclb18jqx8ziakioekdhaarwnc-sp1o_armyeqwgofn0d-bqp-blsopaeuoyia_fi0na!!/dl4/d5/l2djqsevuut3qs80smtfl1o2x0jgqvyzndmzmu9kskmwsudeulu5sk0ymdcx/

Trust: 4.2

url:http://archives.neohapsis.com/archives/bugtraq/2013-12/0053.html

Trust: 1.7

url:http://archives.neohapsis.com/archives/bugtraq/2013-12/att-0053/esa-2013-089.txt

Trust: 1.4

url:https://www.exploit-db.com/exploits/42701/

Trust: 1.2

url:http://secunia.com/advisories/56143

Trust: 1.1

url:http://www.securitytracker.com/id/1029485

Trust: 1.1

url:http://marc.info/?l=bugtraq&m=138723620521347&w=2

Trust: 1.1

url:http://www.attrition.org/pipermail/vim/2014-january/002755.html

Trust: 1.1

url:http://www.zerodayinitiative.com/advisories/zdi-13-283/

Trust: 1.1

url:https://exchange.xforce.ibmcloud.com/vulnerabilities/90728

Trust: 1.1

url:https://www.exploit-db.com/exploits/42702/

Trust: 1.1

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2013-6810

Trust: 0.8

url:http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2013-6810

Trust: 0.8

url:http://secunia.com/advisories/56078/

Trust: 0.6

url:https://nvd.nist.gov/vuln/detail/cve-2013-6810

Trust: 0.2

url:https://cwe.mitre.org/data/definitions/94.html

Trust: 0.1

url:http://tools.cisco.com/security/center/viewalert.x?alertid=32141

Trust: 0.1

url:https://nvd.nist.gov

Trust: 0.1

url:https://h20564.www2.hp.com/portal/site/hpsc/public/kb/

Trust: 0.1

url:https://h20564.www2.hp.com/portal/site/hpsc/public/kb/secbullarchive/

Trust: 0.1

url:http://www.hp.com/support/downloads.

Trust: 0.1

url:http://h41183.www4.hp.com/signup_alerts.php?jumpid=hpsc_secbulletins

Trust: 0.1

url:https://support.emc.com/downloads/120_connectrix

Trust: 0.1

url:https://support.emc.com/products/23304_connectrix-manager-converged-network-edition

Trust: 0.1

url:http://www.zerodayinitiative.com)

Trust: 0.1

sources: ZDI: ZDI-13-278 // ZDI: ZDI-13-283 // ZDI: ZDI-13-279 // ZDI: ZDI-13-280 // ZDI: ZDI-13-282 // ZDI: ZDI-13-281 // CNVD: CNVD-2013-15244 // VULMON: CVE-2013-6810 // JVNDB: JVNDB-2013-005505 // PACKETSTORM: 124478 // PACKETSTORM: 124405 // CNNVD: CNNVD-201312-242 // NVD: CVE-2013-6810

CREDITS

Andrea Micalizzi aka rgod

Trust: 4.2

sources: ZDI: ZDI-13-278 // ZDI: ZDI-13-283 // ZDI: ZDI-13-279 // ZDI: ZDI-13-280 // ZDI: ZDI-13-282 // ZDI: ZDI-13-281

SOURCES

db:ZDIid:ZDI-13-278
db:ZDIid:ZDI-13-283
db:ZDIid:ZDI-13-279
db:ZDIid:ZDI-13-280
db:ZDIid:ZDI-13-282
db:ZDIid:ZDI-13-281
db:CNVDid:CNVD-2013-15244
db:VULMONid:CVE-2013-6810
db:BIDid:64242
db:JVNDBid:JVNDB-2013-005505
db:PACKETSTORMid:124478
db:PACKETSTORMid:124405
db:CNNVDid:CNNVD-201312-242
db:NVDid:CVE-2013-6810

LAST UPDATE DATE

2025-04-11T23:02:50.947000+00:00


SOURCES UPDATE DATE

db:ZDIid:ZDI-13-278date:2013-12-18T00:00:00
db:ZDIid:ZDI-13-283date:2013-12-18T00:00:00
db:ZDIid:ZDI-13-279date:2013-12-18T00:00:00
db:ZDIid:ZDI-13-280date:2013-12-18T00:00:00
db:ZDIid:ZDI-13-282date:2013-12-18T00:00:00
db:ZDIid:ZDI-13-281date:2013-12-18T00:00:00
db:CNVDid:CNVD-2013-15244date:2014-03-24T00:00:00
db:VULMONid:CVE-2013-6810date:2017-09-16T00:00:00
db:BIDid:64242date:2014-01-31T00:34:00
db:JVNDBid:JVNDB-2013-005505date:2015-03-09T00:00:00
db:CNNVDid:CNNVD-201312-242date:2013-12-20T00:00:00
db:NVDid:CVE-2013-6810date:2025-04-11T00:51:21.963

SOURCES RELEASE DATE

db:ZDIid:ZDI-13-278date:2013-12-18T00:00:00
db:ZDIid:ZDI-13-283date:2013-12-18T00:00:00
db:ZDIid:ZDI-13-279date:2013-12-18T00:00:00
db:ZDIid:ZDI-13-280date:2013-12-18T00:00:00
db:ZDIid:ZDI-13-282date:2013-12-18T00:00:00
db:ZDIid:ZDI-13-281date:2013-12-18T00:00:00
db:CNVDid:CNVD-2013-15244date:2013-12-17T00:00:00
db:VULMONid:CVE-2013-6810date:2013-12-12T00:00:00
db:BIDid:64242date:2013-12-11T00:00:00
db:JVNDBid:JVNDB-2013-005505date:2013-12-16T00:00:00
db:PACKETSTORMid:124478date:2013-12-17T03:58:51
db:PACKETSTORMid:124405date:2013-12-13T10:22:22
db:CNNVDid:CNNVD-201312-242date:2013-12-17T00:00:00
db:NVDid:CVE-2013-6810date:2013-12-12T17:55:03.597