ID

VAR-201511-0263


CVE

CVE-2015-7817


TITLE

IBM System Networking Switch Center and Lenovo Switch Center Vulnerable to gaining access to privileged accounts

Trust: 0.8

sources: JVNDB: JVNDB-2015-005918

DESCRIPTION

Race condition in the administration-panel web service in IBM System Networking Switch Center (SNSC) before 7.3.1.5 and Lenovo Switch Center before 8.1.2.0 allows remote attackers to obtain privileged-account access, and consequently provide FileReader.jsp input containing directory traversal sequences to read arbitrary text files, via a request to port 40080 or 40443. Authentication is not required to exploit this vulnerability. The specific flaws exist within the IBM SNSC Web Service, which listens by default on ports 40080 (HTTP) or 40443 (HTTPS) for requests to the administration panel. By combining these two vulnerabilities, an attacker can read arbitrary text files on the system. This may aid in further attacks

Trust: 2.61

sources: NVD: CVE-2015-7817 // JVNDB: JVNDB-2015-005918 // ZDI: ZDI-15-553 // BID: 77550 // VULHUB: VHN-85778

AFFECTED PRODUCTS

vendor:ibmmodel:system networking switch centerscope:lteversion:7.3.1.4

Trust: 1.0

vendor:lenovomodel:switch centerscope:lteversion:8.1.1.0

Trust: 1.0

vendor:ibmmodel:system networking switch centerscope:ltversion:7.3.1.5

Trust: 0.8

vendor:lenovomodel:switch centerscope:ltversion:8.1.2.0

Trust: 0.8

vendor:ibmmodel:system networking switch centerscope: - version: -

Trust: 0.7

vendor:ibmmodel:system networking switch centerscope:eqversion:7.3.1.4

Trust: 0.6

vendor:lenovomodel:switch centerscope:eqversion:8.1.1.0

Trust: 0.3

vendor:ibmmodel:system networking switch centerscope:eqversion:7.3.11

Trust: 0.3

vendor:ibmmodel:system networking switch centerscope:eqversion:7.2.111

Trust: 0.3

vendor:ibmmodel:system networking switch centerscope:eqversion:7.2.110

Trust: 0.3

vendor:ibmmodel:system networking switch centerscope:eqversion:7.1.32

Trust: 0.3

vendor:ibmmodel:system networking switch centerscope:eqversion:7.1.31

Trust: 0.3

vendor:ibmmodel:system networking switch centerscope:eqversion:7.3.1.2

Trust: 0.3

vendor:ibmmodel:system networking switch centerscope:eqversion:7.1.3.4

Trust: 0.3

vendor:ibmmodel:system networking switch centerscope:eqversion:7.1.3.0

Trust: 0.3

vendor:ibmmodel:system networking switch centerscope:eqversion:7.1.2.0

Trust: 0.3

vendor:ibmmodel:system networking switch centerscope:eqversion:7.1.1.0

Trust: 0.3

vendor:ibmmodel:system networking switch centerscope:eqversion:7.1

Trust: 0.3

vendor:lenovomodel:switch centerscope:neversion:8.1.2.0

Trust: 0.3

vendor:ibmmodel:system networking switch centerscope:neversion:7.3.1.5

Trust: 0.3

sources: ZDI: ZDI-15-553 // BID: 77550 // JVNDB: JVNDB-2015-005918 // CNNVD: CNNVD-201511-170 // NVD: CVE-2015-7817

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2015-7817
value: HIGH

Trust: 1.0

NVD: CVE-2015-7817
value: HIGH

Trust: 0.8

ZDI: CVE-2015-7817
value: HIGH

Trust: 0.7

CNNVD: CNNVD-201511-170
value: HIGH

Trust: 0.6

VULHUB: VHN-85778
value: HIGH

Trust: 0.1

nvd@nist.gov: CVE-2015-7817
severity: HIGH
baseScore: 7.1
vectorString: AV:N/AC:M/AU:N/C:C/I:N/A:N
accessVector: NETWORK
accessComplexity: MEDIUM
authentication: NONE
confidentialityImpact: COMPLETE
integrityImpact: NONE
availabilityImpact: NONE
exploitabilityScore: 8.6
impactScore: 6.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 2.5

VULHUB: VHN-85778
severity: HIGH
baseScore: 7.1
vectorString: AV:N/AC:M/AU:N/C:C/I:N/A:N
accessVector: NETWORK
accessComplexity: MEDIUM
authentication: NONE
confidentialityImpact: COMPLETE
integrityImpact: NONE
availabilityImpact: NONE
exploitabilityScore: 8.6
impactScore: 6.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.1

sources: ZDI: ZDI-15-553 // VULHUB: VHN-85778 // JVNDB: JVNDB-2015-005918 // CNNVD: CNNVD-201511-170 // NVD: CVE-2015-7817

PROBLEMTYPE DATA

problemtype:CWE-362

Trust: 1.9

sources: VULHUB: VHN-85778 // JVNDB: JVNDB-2015-005918 // NVD: CVE-2015-7817

THREAT TYPE

remote

Trust: 0.6

sources: CNNVD: CNNVD-201511-170

TYPE

competitive condition

Trust: 0.6

sources: CNNVD: CNNVD-201511-170

CONFIGURATIONS

sources: JVNDB: JVNDB-2015-005918

PATCH

title:LEN-2015-074url:https://support.lenovo.com/jp/ja/product_security/len_2015_074

Trust: 0.8

title:IBM has issued an update to correct this vulnerability.url:https://support.lenovo.com/us/en/product_security/len_2015_074

Trust: 0.7

title:Lenovo Switch Center Repair measures for information disclosure vulnerabilitiesurl:http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=58664

Trust: 0.6

sources: ZDI: ZDI-15-553 // JVNDB: JVNDB-2015-005918 // CNNVD: CNNVD-201511-170

EXTERNAL IDS

db:NVDid:CVE-2015-7817

Trust: 3.5

db:ZDIid:ZDI-15-553

Trust: 3.5

db:JVNDBid:JVNDB-2015-005918

Trust: 0.8

db:ZDI_CANid:ZDI-CAN-3012

Trust: 0.7

db:CNNVDid:CNNVD-201511-170

Trust: 0.7

db:BIDid:77550

Trust: 0.4

db:VULHUBid:VHN-85778

Trust: 0.1

sources: ZDI: ZDI-15-553 // VULHUB: VHN-85778 // BID: 77550 // JVNDB: JVNDB-2015-005918 // CNNVD: CNNVD-201511-170 // NVD: CVE-2015-7817

REFERENCES

url:http://www.zerodayinitiative.com/advisories/zdi-15-553/

Trust: 2.8

url:https://support.lenovo.com/us/en/product_security/len_2015_074

Trust: 2.7

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2015-7817

Trust: 0.8

url:http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2015-7817

Trust: 0.8

url:http://www.ibm.com/

Trust: 0.3

sources: ZDI: ZDI-15-553 // VULHUB: VHN-85778 // BID: 77550 // JVNDB: JVNDB-2015-005918 // CNNVD: CNNVD-201511-170 // NVD: CVE-2015-7817

CREDITS

Andrea Micalizzi (rgod)

Trust: 1.6

sources: ZDI: ZDI-15-553 // BID: 77550 // CNNVD: CNNVD-201511-170

SOURCES

db:ZDIid:ZDI-15-553
db:VULHUBid:VHN-85778
db:BIDid:77550
db:JVNDBid:JVNDB-2015-005918
db:CNNVDid:CNNVD-201511-170
db:NVDid:CVE-2015-7817

LAST UPDATE DATE

2025-04-13T23:27:27.771000+00:00


SOURCES UPDATE DATE

db:ZDIid:ZDI-15-553date:2015-11-10T00:00:00
db:VULHUBid:VHN-85778date:2015-11-12T00:00:00
db:BIDid:77550date:2015-11-10T00:00:00
db:JVNDBid:JVNDB-2015-005918date:2015-11-16T00:00:00
db:CNNVDid:CNNVD-201511-170date:2015-11-13T00:00:00
db:NVDid:CVE-2015-7817date:2025-04-12T10:46:40.837

SOURCES RELEASE DATE

db:ZDIid:ZDI-15-553date:2015-11-10T00:00:00
db:VULHUBid:VHN-85778date:2015-11-12T00:00:00
db:BIDid:77550date:2015-11-10T00:00:00
db:JVNDBid:JVNDB-2015-005918date:2015-11-16T00:00:00
db:CNNVDid:CNNVD-201511-170date:2015-11-11T00:00:00
db:NVDid:CVE-2015-7817date:2015-11-12T03:59:05.170