VARIoT IoT vulnerabilities database
| VAR-201805-1004 | CVE-2018-7933 | Huawei Home gateway products HiRouter-CD20 and WS5200 Path traversal vulnerability |
CVSS V2: 6.8 CVSS V3: 7.8 Severity: HIGH |
Huawei home gateway products HiRouter-CD20 and WS5200 with the versions before HiRouter-CD20-10 1.9.6 and the versions before WS5200-10 1.9.6 have a path traversal vulnerability. Due to the lack of validation while these home gateway products install APK plugins, an attacker tricks a user into installing a malicious APK plugin, and plugin can overwrite arbitrary file of devices. Successful exploit may result in arbitrary code execution or privilege escalation. Huawei HiRouter-CD20 and WS5200 are both home router products released by Huawei. The vulnerability stems from insufficient validation when the APK plugin is installed
| VAR-201805-1127 | CVE-2018-8843 | Rockwell Automation Arena Denial of service vulnerability |
CVSS V2: 4.3 CVSS V3: 5.5 Severity: MEDIUM |
Rockwell Automation Arena versions 15.10.00 and prior contains a use after free vulnerability caused by processing specially crafted Arena Simulation Software files that may cause the software application to crash, potentially losing any unsaved data.. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.The specific flaw exists within the parsing of an Arena Model file. The issue results from the lack of validating the existence of an object prior to performing operations on the object. An attacker can leverage this vulnerability to execute code under the context of the Arena process. Rockwell Automation Arena is a suite of discrete event simulation and automation software from Rockwell Automation.
An attacker can exploit this issue to crash the affected application, resulting in denial-of-service conditions.
Versions prior to Arena 15.10.01 are vulnerable
| VAR-201805-1129 | CVE-2018-8714 | MatrikonOPC Explorer File transfer vulnerability |
CVSS V2: 3.6 CVSS V3: 6.1 Severity: MEDIUM |
Honeywell MatrikonOPC OPC Controller before 5.1.0.0 allows local users to transfer arbitrary files from a host computer and consequently obtain sensitive information via vectors related to MSXML libraries. Honeywell MatrikonOPC OPC Controller Contains an information disclosure vulnerability.Information is obtained and service operation is interrupted (DoS) There is a possibility of being put into a state. MatrikonOPC Explorer is a free tool for viewing data items contained in OPC servers and detecting OPC network communications. A file transfer vulnerability exists in MatrikonOPC Explorer that allows an attacker to transfer unauthorized files from the host system. MatrikonOPC Explorer is prone to local security-bypass vulnerability.
An attacker can exploit this issue to bypass certain security restrictions and perform unauthorized actions. This may aid in further attacks
| VAR-201805-1006 | CVE-2018-7941 | plural Huawei Authentication vulnerabilities in products |
CVSS V2: 6.5 CVSS V3: 8.8 Severity: HIGH |
Huawei iBMC V200R002C60 have an authentication bypass vulnerability. A remote attacker with low privilege may craft specific messages to upload authentication certificate to the affected products. Due to improper validation of the upload authority, successful exploit may cause privilege elevation. plural Huawei The product contains authentication vulnerabilities.Information is obtained, information is altered, and service operation is disrupted (DoS) There is a possibility of being put into a state. Huawei iBMC is a server embedded intelligent management system developed by China Huawei (Huawei). The system has the functions of remote operation and maintenance, fault diagnosis, intelligent management and standardized interface management. The vulnerability is due to the fact that the program does not verify the correct upload permission
| VAR-201805-0934 | CVE-2018-9111 | Foxconn FEMTO AP-FC4064-T Vulnerable to cross-site scripting |
CVSS V2: 3.5 CVSS V3: 5.4 Severity: MEDIUM |
Cross Site Scripting (XSS) exists on the Foxconn FEMTO AP-FC4064-T AP_GT_B38_5.8.3lb15-W47 LTE Build 15 via the configuration of a user account. An attacker can execute arbitrary script on an unsuspecting user's browser. Foxconn FEMTO AP-FC4064-T Contains a cross-site scripting vulnerability.Information may be obtained and information may be altered. Foxconn FEMTO AP-FC4064-T is a home base station equipment manufactured by Foxconn
| VAR-201805-0935 | CVE-2018-9112 | Foxconn FEMTO AP-FC4064-T Vulnerabilities related to the use of hard-coded credentials |
CVSS V2: 7.5 CVSS V3: 9.8 Severity: CRITICAL |
A low privileged admin account with a weak default password of admin exists on the Foxconn FEMTO AP-FC4064-T AP_GT_B38_5.8.3lb15-W47 LTE Build 15. In addition, its web management page relies on the existence or values of cookies when performing security-critical operations. One can gain privileges by modifying cookies. Foxconn FEMTO AP-FC4064-T Contains a vulnerability in the use of hard-coded credentials.Information is obtained, information is altered, and service operation is disrupted (DoS) There is a possibility of being put into a state. Foxconn FEMTO AP-FC4064-T is a home base station equipment manufactured by Foxconn. There is a security vulnerability in the web management page of Foxconn FEMTO AP-FC4064-T AP_GT_B38_5.8.3lb15-W47 LTE Build 15
| VAR-201805-0686 | CVE-2018-10957 | D-Link DIR-868L Cross-Site Request Forgery Vulnerability |
CVSS V2: 6.8 CVSS V3: 8.8 Severity: HIGH |
CSRF exists on D-Link DIR-868L devices, leading to (for example) a change to the Admin password. hedwig.cgi and pigwidgeon.cgi are two of the affected components. D-Link DIR-868L The device contains a cross-site request forgery vulnerability.Information is obtained, information is altered, and service operation is disrupted (DoS) There is a possibility of being put into a state. D-LinkDIR-868L is a wireless router product of D-Link. A cross-site request forgery vulnerability exists in the hedwig.cgi and pigwidgeon.cgi files in D-LinkDIR-868L
| VAR-201805-0957 | CVE-2018-8915 | Synology Calendar Vulnerable to cross-site scripting |
CVSS V2: 3.5 CVSS V3: 5.4 Severity: MEDIUM |
Cross-site scripting (XSS) vulnerability in Notification Center in Synology Calendar before 2.1.1-0502 allows remote authenticated users to inject arbitrary web script or HTML via title parameter. Synology Calendar Contains a cross-site scripting vulnerability.Information may be obtained and information may be altered. Synology Calendar is a file protection program from Synology that runs on Synology NAS devices. Notification Center is one of the system notification components
| VAR-201805-0956 | CVE-2018-8914 | Synology Media Server In SQL Injection vulnerability |
CVSS V2: 7.5 CVSS V3: 9.8 Severity: CRITICAL |
SQL injection vulnerability in UPnP DMA in Synology Media Server before 1.7.6-2842 and before 1.4-2654 allows remote attackers to execute arbitrary SQL commands via the ObjectID parameter. Synology Media Server is a set of media server software from Synology
| VAR-201805-0953 | CVE-2018-8910 | Synology Drive Vulnerable to cross-site scripting |
CVSS V2: 3.5 CVSS V3: 5.4 Severity: MEDIUM |
Cross-site scripting (XSS) vulnerability in Attachment Preview in Synology Drive before 1.0.1-10253 allows remote authenticated users to inject arbitrary web script or HTML via malicious attachments. Synology Drive Contains a cross-site scripting vulnerability.Information may be obtained and information may be altered. Synology Drive is a collaborative office suite from Synology, which includes the functions of document management, collaborative office and file synchronization backup. Attachment Preview is one of the attachment preview plugins
| VAR-201805-1190 | CVE-2018-1258 | Spring Framework Authorization vulnerability |
CVSS V2: 6.5 CVSS V3: 8.8 Severity: HIGH |
Spring Framework version 5.0.5 when used in combination with any versions of Spring Security contains an authorization bypass when using method security. An unauthorized malicious user can gain unauthorized access to methods that should be restricted.
An attacker can exploit this issue to bypass security restrictions and perform unauthorized actions. This may aid in further attacks. Pivotal Software Spring Framework is a set of open source Java and JavaEE application frameworks from Pivotal Software in the United States. The framework helps developers build high-quality applications. Pivotal Software Spring Security is a set of security framework provided by American Pivotal Software Company to provide descriptive security protection for Spring-based applications. -----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256
====================================================================
Red Hat Security Advisory
Synopsis: Important: Red Hat Fuse 7.4.0 security update
Advisory ID: RHSA-2019:2413-01
Product: Red Hat JBoss Fuse
Advisory URL: https://access.redhat.com/errata/RHSA-2019:2413
Issue date: 2019-08-08
CVE Names: CVE-2016-10750 CVE-2018-1258 CVE-2018-1320
CVE-2018-8088 CVE-2018-10899 CVE-2018-15758
CVE-2019-0192 CVE-2019-3805
====================================================================
1. Summary:
A minor version update (from 7.3 to 7.4) is now available for Red Hat Fuse.
The purpose of this text-only errata is to inform you about the security
issues fixed in this release.
Red Hat Product Security has rated this update as having a security impact
of Important. A Common Vulnerability Scoring System (CVSS) base score,
which gives a detailed severity rating, is available for each vulnerability
from the CVE link(s) in the References section.
2. Description:
This release of Red Hat Fuse 7.4.0 serves as a replacement for Red Hat Fuse
7.3, and includes bug fixes and enhancements, which are documented in the
Release Notes document linked to in the References.
Security Fix(es):
* hazelcast: java deserialization in join cluster procedure leading to
remote code execution (CVE-2016-10750)
* slf4j: Deserialisation vulnerability in EventData constructor can allow
for arbitrary code execution (CVE-2018-8088)
* jolokia: system-wide CSRF that could lead to Remote Code Execution
(CVE-2018-10899)
* spring-security-oauth: Privilege escalation by manipulating saved
authorization request (CVE-2018-15758)
* solr: remote code execution due to unsafe deserialization (CVE-2019-0192)
* thrift: SASL negotiation isComplete validation bypass in the
org.apache.thrift.transport.TSaslTransport class (CVE-2018-1320)
* spring-security-core: Unauthorized Access with Spring Security Method
Security (CVE-2018-1258)
* wildfly: Race condition on PID file allows for termination of arbitrary
processes by local users (CVE-2019-3805)
For more details about the security issue(s), including the impact, a CVSS
score, and other related information, refer to the CVE page(s) listed in
the References section.
3. Solution:
Before applying the update, back up your existing installation, including
all applications, configuration files, databases and database settings, and
so on.
Installation instructions are available from the Fuse 7.4.0 product
documentation page:
https://access.redhat.com/documentation/en-us/red_hat_fuse/7.4/
4. Bugs fixed (https://bugzilla.redhat.com/):
1548909 - CVE-2018-8088 slf4j: Deserialisation vulnerability in EventData constructor can allow for arbitrary code execution
1578582 - CVE-2018-1258 spring-security-core: Unauthorized Access with Spring Security Method Security
1601037 - CVE-2018-10899 jolokia: system-wide CSRF that could lead to Remote Code Execution
1643048 - CVE-2018-15758 spring-security-oauth: Privilege escalation by manipulating saved authorization request
1660263 - CVE-2019-3805 wildfly: Race condition on PID file allows for termination of arbitrary processes by local users
1667204 - CVE-2018-1320 thrift: SASL negotiation isComplete validation bypass in the org.apache.thrift.transport.TSaslTransport class
1692345 - CVE-2019-0192 solr: remote code execution due to unsafe deserialization
1713215 - CVE-2016-10750 hazelcast: java deserialization in join cluster procedure leading to remote code execution
5. References:
https://access.redhat.com/security/cve/CVE-2016-10750
https://access.redhat.com/security/cve/CVE-2018-1258
https://access.redhat.com/security/cve/CVE-2018-1320
https://access.redhat.com/security/cve/CVE-2018-8088
https://access.redhat.com/security/cve/CVE-2018-10899
https://access.redhat.com/security/cve/CVE-2018-15758
https://access.redhat.com/security/cve/CVE-2019-0192
https://access.redhat.com/security/cve/CVE-2019-3805
https://access.redhat.com/security/updates/classification/#important
https://access.redhat.com/jbossnetwork/restricted/listSoftware.html?downloadType=distributions&product=jboss.fuse&version=7.4.0
https://access.redhat.com/documentation/en-us/red_hat_fuse/7.4/
6. Contact:
The Red Hat security contact is <secalert@redhat.com>. More contact
details at https://access.redhat.com/security/team/contact/
Copyright 2019 Red Hat, Inc.
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1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rpUB
-----END PGP SIGNATURE-----
--
RHSA-announce mailing list
RHSA-announce@redhat.com
https://www.redhat.com/mailman/listinfo/rhsa-announce
| VAR-201805-0313 | CVE-2018-0582 | ASUS RT-AC68U Cross-Site Scripting Vulnerability |
CVSS V2: 4.3 CVSS V3: 6.1 Severity: MEDIUM |
Cross-site scripting vulnerability in ASUS RT-AC68U Firmware version prior to 3.0.0.4.380.1031 allows remote attackers to inject arbitrary web script or HTML via unspecified vectors. RT-AC68U provided by ASUS Japan Inc. is a wireless LAN router. RT-AC68U contains a cross-site scripting vulnerability (CWE-79). Yuto MAEDA of University of Tsukuba reported this vulnerability to IPA. JPCERT/CC coordinated with the developer under Information Security Early Warning Partnership.An arbitrary script may be executed on the user's web browser
| VAR-201805-1045 | CVE-2018-6021 | Silex SD-320AN and GE MobileLink In OS Command injection vulnerability |
CVSS V2: 6.5 CVSS V3: 7.4 Severity: HIGH |
Silex SD-320AN version 2.01 and prior and GE MobileLink(GEH-SD-320AN) version GEH-1.1 and prior have a system call parameter that is not properly sanitized, which may allow remote code execution. Silex SD-320AN and GE MobileLink (GEH-SD-320AN) Is OS A command injection vulnerability exists.Information is obtained, information is altered, and service operation is disrupted (DoS) There is a possibility of being put into a state. Silex SD-320AN is a serial device server from Japan's Silex Technology Corporation. GE MobileLink (GEH-SD-320AN) is a set of electrocardiogram analysis system of General Electric (GE). A remote attacker could use this vulnerability to execute code. The vulnerability stems from the fact that the program does not have correct filtering system call parameters
| VAR-201805-0651 | CVE-2018-10770 | ShenZhen Anni 5 in 1 XVR Information disclosure vulnerabilities in devices |
CVSS V2: 5.0 CVSS V3: 9.8 Severity: CRITICAL |
download.rsp on ShenZhen Anni "5 in 1 XVR" devices allows remote attackers to download the configuration (without a login) to discover the password. ShenZhen Anni 5 in 1 XVR The device contains an information disclosure vulnerability.Information is acquired, information is falsified, and denial of service (DoS) May be in a state. Anni5in1XVR is a multi-functional DVR device from China's Anni Digital Technology. A security vulnerability exists in the download.rsp file on the Anni5in1XVR device
| VAR-201805-1044 | CVE-2018-6020 | Silex SX-500 and GE MobileLink Authentication vulnerability |
CVSS V2: 6.4 CVSS V3: 6.5 Severity: MEDIUM |
In Silex SX-500 all versions and GE MobileLink(GEH-500) version 1.54 and prior, authentication is not verified when making certain POST requests, which may allow attackers to modify system settings. Silex SX-500 and GE MobileLink(GEH-500) Contains an authentication vulnerability.Tampering with information and disrupting service operations (DoS) There is a possibility of being put into a state. Silex SD-320AN is a serial port device server produced by Silex Technology Company of Japan. GE MobileLink (GEH-500) is an electrocardiogram analysis system developed by General Electric (GE). There is a security vulnerability in Silex SX-500 and GE MobileLink (GEH-500) 1.54 and earlier versions. The vulnerability is caused by the program not performing authentication on POST requests. An attacker could exploit this vulnerability to change system settings
| VAR-201805-0903 | CVE-2018-6492 | HPE Network Operations Management Ultimate and Network Automation Vulnerable to cross-site scripting |
CVSS V2: 4.3 CVSS V3: 6.1 Severity: MEDIUM |
Persistent Cross-Site Scripting, and non-persistent HTML Injection in HP Network Operations Management Ultimate, version 2017.07, 2017.11, 2018.02 and in Network Automation, version 10.00, 10.10, 10.11, 10.20, 10.30, 10.40, 10.50. This vulnerability could be remotely exploited to allow persistent cross-site scripting, and non-persistent HTML Injection. HP Network Automation has a cross-site scripting vulnerability that allows remote attackers to exploit vulnerabilities to inject malicious scripts or HTML code to capture sensitive information or hijack user sessions when malicious data is viewed. Multiple HP Products are prone to the following security vulnerabilities:
1. An SQL-injection vulnerability
2. An HTML-injection vulnerability
Exploiting these vulnerabilities could allow an attacker to steal cookie-based authentication credentials, compromise the application or to control how the site is rendered to the user, access or modify data or exploit latent vulnerabilities in the underlying database. -----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256
Note: the current version of the following document is available here:
https://softwaresupport.hpe.com/document/-/facetsearch/document/KM03158014
SUPPORT COMMUNICATION - SECURITY BULLETIN
Document ID: KM03158014
Version: 1
MFSBGN03806 rev.1 - HP Network Automation Software, Network Operations
Management (NOM) Suite, Multiple Vulnerabilities
NOTICE: The information in this Security Bulletin should be acted upon as
soon as possible.
Release Date: 2018-05-09
Last Updated: 2018-05-09
Potential Security Impact: Remote: Cross-Site Scripting (XSS), SQL Injection
Source: Micro Focus, Product Security Response Team
VULNERABILITY SUMMARY
A potential security vulnerability has been identified in Micro Focus Network
Automation and Network Operations Management (NOM) Suite.
References:
- CVE-2018-6492 - Remote Cross-Site Scripting (XSS)
- CVE-2018-6493 - Remote SQL Injection
SUPPORTED SOFTWARE VERSIONS*: ONLY impacted versions are listed.
- HP Network Automation Software - v10.0x, v10.1x, v10.2x, v10.3x, v10.4x,
v10.5x
- Network Operations Management (NOM) Suite - v2017.06 - Classic Suite,
v2017.11 - Classic Suite, v2017.11 - Containerized Suite, v2018.02 - Classic
Suite, v2018.02 - Containerized Suite
BACKGROUND
CVSS Base Metrics
=================
Reference, CVSS V3 Score/Vector, CVSS V2 Score/Vector
Micro Focus would like to thank Tilman Bender, Dennis Herrmann and Bastian
Kanbach of Context Information Security GmbH for reporting this issue to
cyber-psrt@microfocus.com.
RESOLUTION
MicroFocus has made the following software updates and mitigation information
to resolve the vulnerability in Micro Focus Network Automation (NA) and
Network Operations Management (NOM) Suite:
For the KM please go to the link:
<https://softwaresupport.softwaregrp.com/group/softwaresupport/search-result/
/facetsearch/document/KM03155960>
Patch number 10.00.023, for NA Version 10.0x:
<https://softwaresupport.softwaregrp.com/group/softwaresupport/search-result/
/facetsearch/document/LID/NA_00058>
Patch number 10.11.06, for NA version 10.1x:
<https://softwaresupport.softwaregrp.com/group/softwaresupport/search-result/
/facetsearch/document/LID/NA_00053>
Patch number 10.21.05, for NA version 10.2x:
<https://softwaresupport.softwaregrp.com/group/softwaresupport/search-result/
/facetsearch/document/LID/NA_00054>
Patch number 10.30.03, for NA version 10.3x:
<https://softwaresupport.softwaregrp.com/group/softwaresupport/search-result/
/facetsearch/document/LID/NA_00055>
Patch number 10.40.01, for NA version 10.4x:
<https://softwaresupport.softwaregrp.com/group/softwaresupport/search-result/
/facetsearch/document/LID/NA_00056>
Patch number 10.50.01 - for NA version 10.5x:
<https://softwaresupport.softwaregrp.com/group/softwaresupport/search-result/
/facetsearch/document/LID/NA_00057>
Patch number 10.30.P3 - for NOM version 2017.06 - Classic Suite:
<https://softwaresupport.softwaregrp.com/group/softwaresupport/search-result/
/facetsearch/document/LID/NA_00055>
Patch number 10.40.P1, for NOM version 2017.11 - Classic Suite:
<https://softwaresupport.softwaregrp.com/group/softwaresupport/search-result/
/facetsearch/document/LID/NA_00056>
Patch number 2017.11.P1, for NOM version 2017.11 - Containerized Suite:
<https://softwaresupport.softwaregrp.com/km/KM03150865>
Patch number 10.50.01, for NOM version 2018.02 - Classic Suite:
<https://softwaresupport.softwaregrp.com/group/softwaresupport/search-result/
/facetsearch/document/LID/NA_00057>
Patch number 2018.02.P1, for NOM version 2018.02 - Containerized Suite:
<https://softwaresupport.softwaregrp.com/km/KM03147136>
HISTORY
Version:1 (rev.1) - 10 May 2018 Initial release
Third Party Security Patches: Third party security patches that are to be installed on
systems running Micro Focus products should be applied in accordance with the customer's
patch management policy.
Support: For issues about implementing the recommendations of this Security Bulletin, contact normal Micro Focus services support channel.
For other issues about the content of this Security Bulletin, send e-mail to cyber-psrt@microfocus.com.
Report: To report a potential security vulnerability for any supported product:
Web form: https://www.microfocus.com/support-and-services/report-security
Email: security@microfocus.com
Subscribe:
To initiate receiving subscriptions for future Micro Focus Security Bulletin alerts via Email, please subscribe here - https://softwaresupport.hpe.com/group/softwaresupport/email-notification/-/subscriptions/registerdocumentnotification
Once you are logged in to the portal, please choose security bulletins under product and document types.
Please note that you will need to sign in using a Passport account. If you do not have a Passport account yet, you can create one- its free and easy https://cf.passport.softwaregrp.com/hppcf/createuser.do
Security Bulletin Archive:
A list of recently released Security Bulletins is available here: https://softwaresupport.hpe.com/security-vulnerability
Software Product Category: The Software Product Category is represented in
the title by the two characters following Micro Focus Security Bulletin.
3P = 3rd Party Software
GN = Micro Focus General Software
MU = Multi-Platform Software
System management and security procedures must be reviewed frequently to maintain system integrity.
Micro Focus is continually reviewing and enhancing the security features of software products to provide
customers with current secure solutions.
"Micro Focus is broadly distributing this Security Bulletin in order to bring to the attention of users of the
affected Micro Focus products the important security information contained in this Bulletin. Micro Focus recommends
that all users determine the applicability of this information to their individual situations and take appropriate action.
Micro Focus does not warrant that this information is necessarily accurate or complete for all user situations and, consequently,
Micro Focus will not be responsible for any damages resulting from user's use or disregard of the information provided in
this Security Bulletin. To the extent permitted by law, Micro Focus disclaims all warranties, either express or
implied, including the warranties of merchantability and fitness for a particular purpose, title and non-infringement."
Copyright 2017 EntIT Software LLC
Micro Focus shall not be liable for technical or editorial errors or omissions contained herein.
The information provided is provided "as is" without warranty of any kind. To the extent permitted by law,
neither Micro Focus nor its affiliates, subcontractors or suppliers will be liable for incidental, special
or consequential damages including downtime cost; lost profits; damages relating to the procurement of
substitute products or services; or damages for loss of data, or software restoration.
The information in this document is subject to change without notice. Micro Focus and the names of
Micro Focus products referenced herein are trademarks of Micro Focus in the United States and other countries.
Other product and company names mentioned herein may be trademarks of their respective owners.
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1
iQEcBAEBCAAGBQJa8znlAAoJEHfErXedNUNKYJkH/25W6ElVKb5nCp3LN9US139t
pc/093JtZ2qIy/Alpmic7UxlkBeBajMuqoCyr1uVuruBOTv9AqqOckjPSrPO5ovv
o2S80OJF7AerH+u0I2ogKfJ+caleG+lxRSz9u2ppoLvepA06hbvAmiQi+/ridzq5
n7V0W5wZP/M4klpyY+lOG2CIRkZpnpa5TXIvcK0ESitC9H5kDp9274GFpDlVlXIq
nhsnWjuNszLXQ430IjeQbxotDu4QaVkd82FayACAFrnpFhuiLnHr6cFCCe+FWraG
TcoWcFFpErbPMsMR7QRmzWf8w0zyFCMVKPonRSqnGMR/gS+ihwTZMcviqkpnXLE=
=RgJ1
-----END PGP SIGNATURE-----
| VAR-201805-0904 | CVE-2018-6493 | HP Network Operations Management Ultimate and Network Automation In SQL Injection vulnerability |
CVSS V2: 6.5 CVSS V3: 8.8 Severity: HIGH |
SQL Injection in HP Network Operations Management Ultimate, version 2017.07, 2017.11, 2018.02 and in Network Automation, version 10.00, 10.10, 10.11, 10.20, 10.30, 10.40, 10.50. This vulnerability could be remotely exploited to allow Remote SQL Injection. Multiple HP Products are prone to the following security vulnerabilities:
1. An SQL-injection vulnerability
2. A cross-site scripting vulnerability
3. An HTML-injection vulnerability
Exploiting these vulnerabilities could allow an attacker to steal cookie-based authentication credentials, compromise the application or to control how the site is rendered to the user, access or modify data or exploit latent vulnerabilities in the underlying database. -----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256
Note: the current version of the following document is available here:
https://softwaresupport.hpe.com/document/-/facetsearch/document/KM03158014
SUPPORT COMMUNICATION - SECURITY BULLETIN
Document ID: KM03158014
Version: 1
MFSBGN03806 rev.1 - HP Network Automation Software, Network Operations
Management (NOM) Suite, Multiple Vulnerabilities
NOTICE: The information in this Security Bulletin should be acted upon as
soon as possible.
References:
- CVE-2018-6492 - Remote Cross-Site Scripting (XSS)
- CVE-2018-6493 - Remote SQL Injection
SUPPORTED SOFTWARE VERSIONS*: ONLY impacted versions are listed.
- HP Network Automation Software - v10.0x, v10.1x, v10.2x, v10.3x, v10.4x,
v10.5x
- Network Operations Management (NOM) Suite - v2017.06 - Classic Suite,
v2017.11 - Classic Suite, v2017.11 - Containerized Suite, v2018.02 - Classic
Suite, v2018.02 - Containerized Suite
BACKGROUND
CVSS Base Metrics
=================
Reference, CVSS V3 Score/Vector, CVSS V2 Score/Vector
Micro Focus would like to thank Tilman Bender, Dennis Herrmann and Bastian
Kanbach of Context Information Security GmbH for reporting this issue to
cyber-psrt@microfocus.com.
RESOLUTION
MicroFocus has made the following software updates and mitigation information
to resolve the vulnerability in Micro Focus Network Automation (NA) and
Network Operations Management (NOM) Suite:
For the KM please go to the link:
<https://softwaresupport.softwaregrp.com/group/softwaresupport/search-result/
/facetsearch/document/KM03155960>
Patch number 10.00.023, for NA Version 10.0x:
<https://softwaresupport.softwaregrp.com/group/softwaresupport/search-result/
/facetsearch/document/LID/NA_00058>
Patch number 10.11.06, for NA version 10.1x:
<https://softwaresupport.softwaregrp.com/group/softwaresupport/search-result/
/facetsearch/document/LID/NA_00053>
Patch number 10.21.05, for NA version 10.2x:
<https://softwaresupport.softwaregrp.com/group/softwaresupport/search-result/
/facetsearch/document/LID/NA_00054>
Patch number 10.30.03, for NA version 10.3x:
<https://softwaresupport.softwaregrp.com/group/softwaresupport/search-result/
/facetsearch/document/LID/NA_00055>
Patch number 10.40.01, for NA version 10.4x:
<https://softwaresupport.softwaregrp.com/group/softwaresupport/search-result/
/facetsearch/document/LID/NA_00056>
Patch number 10.50.01 - for NA version 10.5x:
<https://softwaresupport.softwaregrp.com/group/softwaresupport/search-result/
/facetsearch/document/LID/NA_00057>
Patch number 10.30.P3 - for NOM version 2017.06 - Classic Suite:
<https://softwaresupport.softwaregrp.com/group/softwaresupport/search-result/
/facetsearch/document/LID/NA_00055>
Patch number 10.40.P1, for NOM version 2017.11 - Classic Suite:
<https://softwaresupport.softwaregrp.com/group/softwaresupport/search-result/
/facetsearch/document/LID/NA_00056>
Patch number 2017.11.P1, for NOM version 2017.11 - Containerized Suite:
<https://softwaresupport.softwaregrp.com/km/KM03150865>
Patch number 10.50.01, for NOM version 2018.02 - Classic Suite:
<https://softwaresupport.softwaregrp.com/group/softwaresupport/search-result/
/facetsearch/document/LID/NA_00057>
Patch number 2018.02.P1, for NOM version 2018.02 - Containerized Suite:
<https://softwaresupport.softwaregrp.com/km/KM03147136>
HISTORY
Version:1 (rev.1) - 10 May 2018 Initial release
Third Party Security Patches: Third party security patches that are to be installed on
systems running Micro Focus products should be applied in accordance with the customer's
patch management policy.
Support: For issues about implementing the recommendations of this Security Bulletin, contact normal Micro Focus services support channel.
For other issues about the content of this Security Bulletin, send e-mail to cyber-psrt@microfocus.com.
Report: To report a potential security vulnerability for any supported product:
Web form: https://www.microfocus.com/support-and-services/report-security
Email: security@microfocus.com
Subscribe:
To initiate receiving subscriptions for future Micro Focus Security Bulletin alerts via Email, please subscribe here - https://softwaresupport.hpe.com/group/softwaresupport/email-notification/-/subscriptions/registerdocumentnotification
Once you are logged in to the portal, please choose security bulletins under product and document types.
Please note that you will need to sign in using a Passport account. If you do not have a Passport account yet, you can create one- its free and easy https://cf.passport.softwaregrp.com/hppcf/createuser.do
Security Bulletin Archive:
A list of recently released Security Bulletins is available here: https://softwaresupport.hpe.com/security-vulnerability
Software Product Category: The Software Product Category is represented in
the title by the two characters following Micro Focus Security Bulletin.
3P = 3rd Party Software
GN = Micro Focus General Software
MU = Multi-Platform Software
System management and security procedures must be reviewed frequently to maintain system integrity.
Micro Focus is continually reviewing and enhancing the security features of software products to provide
customers with current secure solutions.
"Micro Focus is broadly distributing this Security Bulletin in order to bring to the attention of users of the
affected Micro Focus products the important security information contained in this Bulletin. Micro Focus recommends
that all users determine the applicability of this information to their individual situations and take appropriate action.
Micro Focus does not warrant that this information is necessarily accurate or complete for all user situations and, consequently,
Micro Focus will not be responsible for any damages resulting from user's use or disregard of the information provided in
this Security Bulletin. To the extent permitted by law, Micro Focus disclaims all warranties, either express or
implied, including the warranties of merchantability and fitness for a particular purpose, title and non-infringement."
Copyright 2017 EntIT Software LLC
Micro Focus shall not be liable for technical or editorial errors or omissions contained herein.
The information provided is provided "as is" without warranty of any kind. To the extent permitted by law,
neither Micro Focus nor its affiliates, subcontractors or suppliers will be liable for incidental, special
or consequential damages including downtime cost; lost profits; damages relating to the procurement of
substitute products or services; or damages for loss of data, or software restoration.
The information in this document is subject to change without notice. Micro Focus and the names of
Micro Focus products referenced herein are trademarks of Micro Focus in the United States and other countries.
Other product and company names mentioned herein may be trademarks of their respective owners.
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1
iQEcBAEBCAAGBQJa8znlAAoJEHfErXedNUNKYJkH/25W6ElVKb5nCp3LN9US139t
pc/093JtZ2qIy/Alpmic7UxlkBeBajMuqoCyr1uVuruBOTv9AqqOckjPSrPO5ovv
o2S80OJF7AerH+u0I2ogKfJ+caleG+lxRSz9u2ppoLvepA06hbvAmiQi+/ridzq5
n7V0W5wZP/M4klpyY+lOG2CIRkZpnpa5TXIvcK0ESitC9H5kDp9274GFpDlVlXIq
nhsnWjuNszLXQ430IjeQbxotDu4QaVkd82FayACAFrnpFhuiLnHr6cFCCe+FWraG
TcoWcFFpErbPMsMR7QRmzWf8w0zyFCMVKPonRSqnGMR/gS+ihwTZMcviqkpnXLE=
=RgJ1
-----END PGP SIGNATURE-----
| VAR-201805-0241 | CVE-2018-10652 | Citrix XenMobile Server Information Disclosure Vulnerability |
CVSS V2: 5.0 CVSS V3: 7.5 Severity: HIGH |
There is a Sensitive Data Leakage issue in Citrix XenMobile Server 10.7 before RP3. DasanGPON is a home router product from Dasan, Korea. A command injection vulnerability exists in the DasanGPON home router. The vulnerability is caused by the router saving the result of the Internet packet explorer in /tmp and transmitting it to the user when the user accesses the /diag.html page again. An attacker could use the vulnerability to execute a command and retrieve the output by sending a diag_action=ping request with the \342\200\230dest_host\342\200\231 parameter to GponForm/diag_FormURI
| VAR-201805-0314 | CVE-2018-0583 | ASUS RT-AC1200HP Cross-Site Scripting Vulnerability |
CVSS V2: 4.3 CVSS V3: 6.1 Severity: MEDIUM |
Cross-site scripting vulnerability in ASUS RT-AC1200HP Firmware version prior to 3.0.0.4.380.4180 allows remote attackers to inject arbitrary web script or HTML via unspecified vectors. RT-AC1200HP provided by ASUS Japan Inc. is a wireless LAN router. RT-AC1200HP contains a cross-site scripting vulnerability (CWE-79). Satoshi Ogawa of Mitsui Bussan Secure Directions, Inc. reported this vulnerability to IPA. JPCERT/CC coordinated with the developer under Information Security Early Warning Partnership.An arbitrary script may be executed on the logged in user's web browser
| VAR-201805-0312 | CVE-2018-0581 | RT-AC87U vulnerable to cross-site scripting |
CVSS V2: 4.3 CVSS V3: 6.1 Severity: MEDIUM |
Cross-site scripting vulnerability in ASUS RT-AC87U Firmware version prior to 3.0.0.4.378.9383 allows remote attackers to inject arbitrary web script or HTML via unspecified vectors. RT-AC87U provided by ASUS Japan Inc. is a wireless LAN router. RT-AC87U contains a cross-site scripting vulnerability (CWE-79). Keigo Yamazaki of LAC Co., Ltd. reported this vulnerability to IPA. JPCERT/CC coordinated with the developer under Information Security Early Warning Partnership.An arbitrary script may be executed on the user's web browser