ID

VAR-201708-1115


CVE

CVE-2017-12694


TITLE

SpiderControl SCADA Web Server Directory Traversal Vulnerability

Trust: 0.8

sources: IVD: 95deff53-7157-4b43-8155-5b5120c5ac97 // CNVD: CNVD-2017-22815

DESCRIPTION

A Directory Traversal issue was discovered in SpiderControl SCADA Web Server. An attacker may be able to use a simple GET request to perform a directory traversal into system files. This vulnerability allows remote attackers to disclose sensitive information on vulnerable installations of SpiderControl SCADA. Authentication is not required to exploit this vulnerability. The issue results from the lack of proper validation of a user-supplied path prior to using it in file operations. An attacker can leverage this vulnerability to disclose files accessible to the SYSTEM account. Remote attackers can use specially crafted requests with directory-traversal sequences ('../') to read arbitrary files in the context of the application. This may aid in further attacks

Trust: 3.24

sources: NVD: CVE-2017-12694 // JVNDB: JVNDB-2017-007389 // ZDI: ZDI-17-695 // CNVD: CNVD-2017-22815 // BID: 100456 // IVD: 95deff53-7157-4b43-8155-5b5120c5ac97

IOT TAXONOMY

category:['ICS']sub_category: -

Trust: 0.8

sources: IVD: 95deff53-7157-4b43-8155-5b5120c5ac97 // CNVD: CNVD-2017-22815

AFFECTED PRODUCTS

vendor:spidercontrolmodel:scada web serverscope:eqversion: -

Trust: 1.6

vendor:ininetmodel:scada web serverscope: - version: -

Trust: 0.8

vendor:spidercontrolmodel:scada webserver ininetscope: - version: -

Trust: 0.7

vendor:spidercontrolmodel:scada web serverscope: - version: -

Trust: 0.6

vendor:spidercontrolmodel:scada web serverscope:eqversion:0

Trust: 0.3

vendor:spidercontrolmodel:scada web serverscope:neversion:2.02.0100

Trust: 0.3

vendor:scada web servermodel: - scope:eqversion: -

Trust: 0.2

sources: IVD: 95deff53-7157-4b43-8155-5b5120c5ac97 // ZDI: ZDI-17-695 // CNVD: CNVD-2017-22815 // BID: 100456 // JVNDB: JVNDB-2017-007389 // CNNVD: CNNVD-201708-1070 // NVD: CVE-2017-12694

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2017-12694
value: HIGH

Trust: 1.0

NVD: CVE-2017-12694
value: HIGH

Trust: 0.8

ZDI: CVE-2017-12694
value: HIGH

Trust: 0.7

CNVD: CNVD-2017-22815
value: MEDIUM

Trust: 0.6

CNNVD: CNNVD-201708-1070
value: HIGH

Trust: 0.6

IVD: 95deff53-7157-4b43-8155-5b5120c5ac97
value: HIGH

Trust: 0.2

nvd@nist.gov: CVE-2017-12694
severity: MEDIUM
baseScore: 5.0
vectorString: AV:N/AC:L/AU:N/C:P/I:N/A:N
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: NONE
availabilityImpact: NONE
exploitabilityScore: 10.0
impactScore: 2.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.8

ZDI: CVE-2017-12694
severity: HIGH
baseScore: 7.8
vectorString: AV:N/AC:L/AU:N/C:C/I:N/A:N
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: COMPLETE
integrityImpact: NONE
availabilityImpact: NONE
exploitabilityScore: 10.0
impactScore: 6.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.7

CNVD: CNVD-2017-22815
severity: MEDIUM
baseScore: 5.0
vectorString: AV:N/AC:L/AU:N/C:P/I:N/A:N
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: NONE
availabilityImpact: NONE
exploitabilityScore: 10.0
impactScore: 2.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.6

IVD: 95deff53-7157-4b43-8155-5b5120c5ac97
severity: MEDIUM
baseScore: 5.0
vectorString: AV:N/AC:L/AU:N/C:P/I:N/A:N
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: NONE
availabilityImpact: NONE
exploitabilityScore: 10.0
impactScore: 2.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.9 [IVD]

Trust: 0.2

nvd@nist.gov: CVE-2017-12694
baseSeverity: HIGH
baseScore: 7.5
vectorString: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
attackVector: NETWORK
attackComplexity: LOW
privilegesRequired: NONE
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: HIGH
integrityImpact: NONE
availabilityImpact: NONE
exploitabilityScore: 3.9
impactScore: 3.6
version: 3.0

Trust: 1.8

sources: IVD: 95deff53-7157-4b43-8155-5b5120c5ac97 // ZDI: ZDI-17-695 // CNVD: CNVD-2017-22815 // JVNDB: JVNDB-2017-007389 // CNNVD: CNNVD-201708-1070 // NVD: CVE-2017-12694

PROBLEMTYPE DATA

problemtype:CWE-22

Trust: 1.8

sources: JVNDB: JVNDB-2017-007389 // NVD: CVE-2017-12694

THREAT TYPE

remote

Trust: 0.6

sources: CNNVD: CNNVD-201708-1070

TYPE

Path traversal

Trust: 0.8

sources: IVD: 95deff53-7157-4b43-8155-5b5120c5ac97 // CNNVD: CNNVD-201708-1070

CONFIGURATIONS

sources: JVNDB: JVNDB-2017-007389

PATCH

title:Top Pageurl:http://spidercontrol.net/?lang=en

Trust: 0.8

title:SpiderControl has issued an update to correct this vulnerability.url:https://ics-cert.us-cert.gov/advisories/ICSA-17-234-03

Trust: 0.7

title:SpiderControl SCADA Web Server Directory Traversal Vulnerability Patchurl:https://www.cnvd.org.cn/patchInfo/show/100834

Trust: 0.6

title:iniNet Solutions SpiderControl SCADA Web Server Repair measures for path traversal vulnerabilitiesurl:http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=74279

Trust: 0.6

sources: ZDI: ZDI-17-695 // CNVD: CNVD-2017-22815 // JVNDB: JVNDB-2017-007389 // CNNVD: CNNVD-201708-1070

EXTERNAL IDS

db:NVDid:CVE-2017-12694

Trust: 4.2

db:ICS CERTid:ICSA-17-234-03

Trust: 2.7

db:BIDid:100456

Trust: 1.9

db:CNVDid:CNVD-2017-22815

Trust: 0.8

db:CNNVDid:CNNVD-201708-1070

Trust: 0.8

db:JVNDBid:JVNDB-2017-007389

Trust: 0.8

db:ZDI_CANid:ZDI-CAN-4174

Trust: 0.7

db:ZDIid:ZDI-17-695

Trust: 0.7

db:IVDid:95DEFF53-7157-4B43-8155-5B5120C5AC97

Trust: 0.2

sources: IVD: 95deff53-7157-4b43-8155-5b5120c5ac97 // ZDI: ZDI-17-695 // CNVD: CNVD-2017-22815 // BID: 100456 // JVNDB: JVNDB-2017-007389 // CNNVD: CNNVD-201708-1070 // NVD: CVE-2017-12694

REFERENCES

url:https://ics-cert.us-cert.gov/advisories/icsa-17-234-03

Trust: 3.4

url:http://www.securityfocus.com/bid/100456

Trust: 1.6

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2017-12694

Trust: 0.8

url:https://nvd.nist.gov/vuln/detail/cve-2017-12694

Trust: 0.8

url:http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2017-12694

Trust: 0.6

url:http://spidercontrol.net/

Trust: 0.3

sources: ZDI: ZDI-17-695 // CNVD: CNVD-2017-22815 // BID: 100456 // JVNDB: JVNDB-2017-007389 // CNNVD: CNNVD-201708-1070 // NVD: CVE-2017-12694

CREDITS

juushya

Trust: 0.7

sources: ZDI: ZDI-17-695

SOURCES

db:IVDid:95deff53-7157-4b43-8155-5b5120c5ac97
db:ZDIid:ZDI-17-695
db:CNVDid:CNVD-2017-22815
db:BIDid:100456
db:JVNDBid:JVNDB-2017-007389
db:CNNVDid:CNNVD-201708-1070
db:NVDid:CVE-2017-12694

LAST UPDATE DATE

2025-04-20T23:32:51.232000+00:00


SOURCES UPDATE DATE

db:ZDIid:ZDI-17-695date:2017-08-23T00:00:00
db:CNVDid:CNVD-2017-22815date:2017-08-25T00:00:00
db:BIDid:100456date:2017-08-22T00:00:00
db:JVNDBid:JVNDB-2017-007389date:2017-09-20T00:00:00
db:CNNVDid:CNNVD-201708-1070date:2019-10-17T00:00:00
db:NVDid:CVE-2017-12694date:2025-04-20T01:37:25.860

SOURCES RELEASE DATE

db:IVDid:95deff53-7157-4b43-8155-5b5120c5ac97date:2017-08-25T00:00:00
db:ZDIid:ZDI-17-695date:2017-08-23T00:00:00
db:CNVDid:CNVD-2017-22815date:2017-08-25T00:00:00
db:BIDid:100456date:2017-08-22T00:00:00
db:JVNDBid:JVNDB-2017-007389date:2017-09-20T00:00:00
db:CNNVDid:CNNVD-201708-1070date:2017-08-24T00:00:00
db:NVDid:CVE-2017-12694date:2017-08-25T19:29:00.177