ID

VAR-201509-0299


CVE

CVE-2015-6459


TITLE

GE Digital Energy MDS PulseNET and MDS PulseNET Enterprise Absolute Path Traversal Vulnerability

Trust: 1.2

sources: CNVD: CNVD-2015-06254 // CNNVD: CNNVD-201509-379

DESCRIPTION

Absolute path traversal vulnerability in the download feature in FileDownloadServlet in GE Digital Energy MDS PulseNET and MDS PulseNET Enterprise before 3.1.5 allows remote attackers to read or delete arbitrary files via a full pathname. Authentication is not required to exploit this vulnerability.The specific flaw exists within the FileDownloadServlet. By specifying a filename including directory traversal, an attacker can read and then delete an arbitrary file on the system. The read and subsequent deletion will be performed under the context of SYSTEM. GE Digital Energy MDS PulseNET and MDS PulseNET Enterprise are products of General Electric (GE). GE Digital Energy MDS PulseNET is a software application for monitoring industrial communications network equipment. MDS PulseNET Enterprise is one of the enterprise editions. This may aid in further attacks

Trust: 3.06

sources: NVD: CVE-2015-6459 // JVNDB: JVNDB-2015-004925 // ZDI: ZDI-15-439 // CNVD: CNVD-2015-06254 // BID: 76756

IOT TAXONOMY

category:['ICS']sub_category: -

Trust: 0.6

sources: CNVD: CNVD-2015-06254

AFFECTED PRODUCTS

vendor:gemodel:mds pulsenetscope:lteversion:3.1.3

Trust: 1.0

vendor:general electricmodel:mds pulsenetscope:ltversion:3.1.5

Trust: 0.8

vendor:general electricmodel:mds pulsenetscope:ltversion:enterprise 3.1.5

Trust: 0.8

vendor:gemodel:mds pulsenetscope: - version: -

Trust: 0.7

vendor:general electricmodel:mds pulsenetscope: - version: -

Trust: 0.6

vendor:gemodel:mds pulsenetscope:eqversion:3.1.3

Trust: 0.6

sources: ZDI: ZDI-15-439 // CNVD: CNVD-2015-06254 // JVNDB: JVNDB-2015-004925 // CNNVD: CNNVD-201509-379 // NVD: CVE-2015-6459

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2015-6459
value: HIGH

Trust: 1.0

NVD: CVE-2015-6459
value: HIGH

Trust: 0.8

ZDI: CVE-2015-6459
value: HIGH

Trust: 0.7

CNVD: CNVD-2015-06254
value: HIGH

Trust: 0.6

CNNVD: CNNVD-201509-379
value: CRITICAL

Trust: 0.6

nvd@nist.gov: CVE-2015-6459
severity: HIGH
baseScore: 10.0
vectorString: AV:N/AC:L/AU:N/C:C/I:C/A:C
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: COMPLETE
integrityImpact: COMPLETE
availabilityImpact: COMPLETE
exploitabilityScore: 10.0
impactScore: 10.0
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.8

ZDI: CVE-2015-6459
severity: HIGH
baseScore: 9.4
vectorString: AV:N/AC:L/AU:N/C:C/I:N/A:C
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: COMPLETE
integrityImpact: NONE
availabilityImpact: COMPLETE
exploitabilityScore: 10.0
impactScore: 9.2
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.7

CNVD: CNVD-2015-06254
severity: HIGH
baseScore: 9.4
vectorString: AV:N/AC:L/AU:N/C:C/I:N/A:C
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: COMPLETE
integrityImpact: NONE
availabilityImpact: COMPLETE
exploitabilityScore: 10.0
impactScore: 9.2
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.6

sources: ZDI: ZDI-15-439 // CNVD: CNVD-2015-06254 // JVNDB: JVNDB-2015-004925 // CNNVD: CNNVD-201509-379 // NVD: CVE-2015-6459

PROBLEMTYPE DATA

problemtype:CWE-22

Trust: 1.8

sources: JVNDB: JVNDB-2015-004925 // NVD: CVE-2015-6459

THREAT TYPE

remote

Trust: 0.6

sources: CNNVD: CNNVD-201509-379

TYPE

path traversal

Trust: 0.6

sources: CNNVD: CNNVD-201509-379

CONFIGURATIONS

sources: JVNDB: JVNDB-2015-004925

PATCH

title:MDS PulseNet Support Documentsurl:http://www.gedigitalenergy.com/app/resources.aspx?prod=pulsenet&type=9

Trust: 0.8

title:GE has issued an update to correct this vulnerability.url:https://ics-cert.us-cert.gov/advisories/ICSA-15-258-03

Trust: 0.7

title:Patch for GE Digital Energy MDS PulseNET and MDS PulseNET Enterprise Absolute Path Traversal Vulnerabilityurl:https://www.cnvd.org.cn/patchInfo/show/64557

Trust: 0.6

sources: ZDI: ZDI-15-439 // CNVD: CNVD-2015-06254 // JVNDB: JVNDB-2015-004925

EXTERNAL IDS

db:NVDid:CVE-2015-6459

Trust: 4.0

db:ICS CERTid:ICSA-15-258-03

Trust: 3.0

db:ZDIid:ZDI-15-439

Trust: 2.9

db:JVNDBid:JVNDB-2015-004925

Trust: 0.8

db:ZDI_CANid:ZDI-CAN-2906

Trust: 0.7

db:CNVDid:CNVD-2015-06254

Trust: 0.6

db:CNNVDid:CNNVD-201509-379

Trust: 0.6

db:BIDid:76756

Trust: 0.3

sources: ZDI: ZDI-15-439 // CNVD: CNVD-2015-06254 // BID: 76756 // JVNDB: JVNDB-2015-004925 // CNNVD: CNNVD-201509-379 // NVD: CVE-2015-6459

REFERENCES

url:https://ics-cert.us-cert.gov/advisories/icsa-15-258-03

Trust: 3.7

url:http://zerodayinitiative.com/advisories/zdi-15-439/

Trust: 2.2

url:http://www.gedigitalenergy.com/app/resources.aspx?prod=pulsenet&type=9

Trust: 1.6

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2015-6459

Trust: 0.8

url:http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2015-6459

Trust: 0.8

sources: ZDI: ZDI-15-439 // CNVD: CNVD-2015-06254 // JVNDB: JVNDB-2015-004925 // CNNVD: CNNVD-201509-379 // NVD: CVE-2015-6459

CREDITS

Andrea Micalizzi (rgod)

Trust: 0.7

sources: ZDI: ZDI-15-439

SOURCES

db:ZDIid:ZDI-15-439
db:CNVDid:CNVD-2015-06254
db:BIDid:76756
db:JVNDBid:JVNDB-2015-004925
db:CNNVDid:CNNVD-201509-379
db:NVDid:CVE-2015-6459

LAST UPDATE DATE

2025-04-13T23:25:12.417000+00:00


SOURCES UPDATE DATE

db:ZDIid:ZDI-15-439date:2015-09-16T00:00:00
db:CNVDid:CNVD-2015-06254date:2015-09-29T00:00:00
db:BIDid:76756date:2015-11-03T19:14:00
db:JVNDBid:JVNDB-2015-004925date:2015-09-29T00:00:00
db:CNNVDid:CNNVD-201509-379date:2015-09-21T00:00:00
db:NVDid:CVE-2015-6459date:2025-04-12T10:46:40.837

SOURCES RELEASE DATE

db:ZDIid:ZDI-15-439date:2015-09-16T00:00:00
db:CNVDid:CNVD-2015-06254date:2015-09-29T00:00:00
db:BIDid:76756date:2015-09-15T00:00:00
db:JVNDBid:JVNDB-2015-004925date:2015-09-29T00:00:00
db:CNNVDid:CNNVD-201509-379date:2015-09-21T00:00:00
db:NVDid:CVE-2015-6459date:2015-09-18T22:59:07.013