ID

VAR-202001-1150


CVE

CVE-2013-4864


TITLE

Mi Casa Verde VeraLite Security Bypass Vulnerability

Trust: 0.9

sources: CNVD: CNVD-2013-12047 // BID: 61595

DESCRIPTION

MiCasaVerde VeraLite with firmware 1.5.408 allows remote attackers to send HTTP requests to intranet servers via the url parameter to cgi-bin/cmh/proxy.sh, related to a Server-Side Request Forgery (SSRF) issue. MiCasaVerde VeraLite Contains a server-side request forgery vulnerability.Information is acquired, information is falsified, and denial of service (DoS) May be in a state. Mi Casa Verde VeraLite is a home gateway controller device from Mi Casa Verde, Hong Kong, China. The device can control the home appliances connected to the home Wi-Fi network through a computer or mobile phone. There is a security bypass vulnerability in Mi Casa Verde VeraLite. An attacker can exploit a vulnerability to bypass specific security restrictions and perform unauthorized operations

Trust: 2.43

sources: NVD: CVE-2013-4864 // JVNDB: JVNDB-2013-007152 // CNVD: CNVD-2013-12047 // BID: 61595

IOT TAXONOMY

category:['Network device']sub_category: -

Trust: 0.6

sources: CNVD: CNVD-2013-12047

AFFECTED PRODUCTS

vendor:micasaverdemodel:veralitescope:eqversion:1.5.408

Trust: 1.0

vendor:mimodel:casa verde veralitescope:eqversion:1.5.408

Trust: 0.9

vendor:vera controlmodel:veralitescope:eqversion: -

Trust: 0.8

vendor:vera controlmodel:veralitescope:eqversion:veralite firmware 1.5.408

Trust: 0.8

sources: CNVD: CNVD-2013-12047 // BID: 61595 // JVNDB: JVNDB-2013-007152 // NVD: CVE-2013-4864

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2013-4864
value: CRITICAL

Trust: 1.0

NVD: CVE-2013-4864
value: CRITICAL

Trust: 0.8

CNVD: CNVD-2013-12047
value: MEDIUM

Trust: 0.6

CNNVD: CNNVD-201308-040
value: CRITICAL

Trust: 0.6

nvd@nist.gov: CVE-2013-4864
severity: HIGH
baseScore: 7.5
vectorString: AV:N/AC:L/AU:N/C:P/I:P/A:P
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: PARTIAL
availabilityImpact: PARTIAL
exploitabilityScore: 10.0
impactScore: 6.4
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.8

CNVD: CNVD-2013-12047
severity: MEDIUM
baseScore: 6.8
vectorString: AV:N/AC:M/AU:N/C:P/I:P/A:P
accessVector: NETWORK
accessComplexity: MEDIUM
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: PARTIAL
availabilityImpact: PARTIAL
exploitabilityScore: 8.6
impactScore: 6.4
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.6

nvd@nist.gov: CVE-2013-4864
baseSeverity: CRITICAL
baseScore: 9.8
vectorString: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
attackVector: NETWORK
attackComplexity: LOW
privilegesRequired: NONE
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: HIGH
integrityImpact: HIGH
availabilityImpact: HIGH
exploitabilityScore: 3.9
impactScore: 5.9
version: 3.1

Trust: 1.0

NVD: CVE-2013-4864
baseSeverity: CRITICAL
baseScore: 9.8
vectorString: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
attackVector: NETWORK
attackComplexity: LOW
privilegesRequired: NONE
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: HIGH
integrityImpact: HIGH
availabilityImpact: HIGH
exploitabilityScore: NONE
impactScore: NONE
version: 3.0

Trust: 0.8

sources: CNVD: CNVD-2013-12047 // JVNDB: JVNDB-2013-007152 // CNNVD: CNNVD-201308-040 // NVD: CVE-2013-4864

PROBLEMTYPE DATA

problemtype:CWE-918

Trust: 1.0

problemtype:Server-side request forgery (CWE-918) [NVD Evaluation ]

Trust: 0.8

sources: JVNDB: JVNDB-2013-007152 // NVD: CVE-2013-4864

THREAT TYPE

remote

Trust: 0.6

sources: CNNVD: CNNVD-201308-040

TYPE

code problem

Trust: 0.6

sources: CNNVD: CNNVD-201308-040

PATCH

title:Top Pageurl:https://support.getvera.com/hc/en-us

Trust: 0.8

sources: JVNDB: JVNDB-2013-007152

EXTERNAL IDS

db:NVDid:CVE-2013-4864

Trust: 3.3

db:PACKETSTORMid:122654

Trust: 2.4

db:EXPLOIT-DBid:27286

Trust: 1.6

db:BIDid:61595

Trust: 0.9

db:JVNDBid:JVNDB-2013-007152

Trust: 0.8

db:CNVDid:CNVD-2013-12047

Trust: 0.6

db:CNNVDid:CNNVD-201308-040

Trust: 0.6

sources: CNVD: CNVD-2013-12047 // BID: 61595 // JVNDB: JVNDB-2013-007152 // CNNVD: CNNVD-201308-040 // NVD: CVE-2013-4864

REFERENCES

url:http://packetstormsecurity.com/files/122654/micasaverde-veralite-1.5.408-traversal-authorization-csrf-disclosure.html

Trust: 2.4

url:http://www.exploit-db.com/exploits/27286

Trust: 1.6

url:https://www3.trustwave.com/spiderlabs/advisories/twsl2013-019.txt

Trust: 1.6

url:https://nvd.nist.gov/vuln/detail/cve-2013-4864

Trust: 1.4

url:http://www.securityfocus.com/bid/61595

Trust: 0.6

url:http://seclists.org/fulldisclosure/2013/aug/17

Trust: 0.3

url:http://www.micasaverde.com/controllers/veralite/

Trust: 0.3

sources: CNVD: CNVD-2013-12047 // BID: 61595 // JVNDB: JVNDB-2013-007152 // CNNVD: CNNVD-201308-040 // NVD: CVE-2013-4864

CREDITS

Daniel Crowley of Trustwave SpiderLabs

Trust: 0.9

sources: BID: 61595 // CNNVD: CNNVD-201308-040

SOURCES

db:CNVDid:CNVD-2013-12047
db:BIDid:61595
db:JVNDBid:JVNDB-2013-007152
db:CNNVDid:CNNVD-201308-040
db:NVDid:CVE-2013-4864

LAST UPDATE DATE

2024-11-23T21:55:40.694000+00:00


SOURCES UPDATE DATE

db:CNVDid:CNVD-2013-12047date:2013-08-12T00:00:00
db:BIDid:61595date:2013-08-01T00:00:00
db:JVNDBid:JVNDB-2013-007152date:2020-02-18T00:00:00
db:CNNVDid:CNNVD-201308-040date:2020-05-29T00:00:00
db:NVDid:CVE-2013-4864date:2024-11-21T01:56:35.670

SOURCES RELEASE DATE

db:CNVDid:CNVD-2013-12047date:2013-08-12T00:00:00
db:BIDid:61595date:2013-08-01T00:00:00
db:JVNDBid:JVNDB-2013-007152date:2020-02-18T00:00:00
db:CNNVDid:CNNVD-201308-040date:2013-08-06T00:00:00
db:NVDid:CVE-2013-4864date:2020-01-28T17:15:11.787