CNVD-2015-06254
Vulnerability from cnvd - Published: 2015-09-29
VLAI Severity ?
Title
GE Digital Energy MDS PulseNET和MDS PulseNET Enterprise绝对路径遍历漏洞
Description
GE Digital Energy MDS PulseNET和MDS PulseNET Enterprise都是美国通用电气(GE)公司的产品。GE Digital Energy MDS PulseNET是一套监控工业通讯网络设备的软件应用程序。MDS PulseNET Enterprise是其中的一个企业版。
GE Digital Energy MDS PulseNET和MDS PulseNET Enterprise 3.1.5之前版本的FileDownloadServlet中的下载功能存在绝对路径遍历漏洞。远程攻击者可通过完整的路径名利用该漏洞读取或删除任意文件。
Severity
高
Patch Name
GE Digital Energy MDS PulseNET和MDS PulseNET Enterprise绝对路径遍历漏洞的补丁
Patch Description
GE Digital Energy MDS PulseNET和MDS PulseNET Enterprise都是美国通用电气(GE)公司的产品。GE Digital Energy MDS PulseNET是一套监控工业通讯网络设备的软件应用程序。MDS PulseNET Enterprise是其中的一个企业版。
GE Digital Energy MDS PulseNET和MDS PulseNET Enterprise 3.1.5之前版本的FileDownloadServlet中的下载功能存在绝对路径遍历漏洞。远程攻击者可通过完整的路径名利用该漏洞读取或删除任意文件。目前,供应商发布了安全公告及相关补丁信息,修复了此漏洞。
Formal description
用户可参考如下供应商提供的安全公告获得补丁信息: https://ics-cert.us-cert.gov/advisories/ICSA-15-258-03
Reference
https://ics-cert.us-cert.gov/advisories/ICSA-15-258-03
http://zerodayinitiative.com/advisories/ZDI-15-439/
Impacted products
| Name | General Electric Company MDS PulseNET |
|---|
{
"cves": {
"cve": {
"cveNumber": "CVE-2015-6459"
}
},
"description": "GE Digital Energy MDS PulseNET\u548cMDS PulseNET Enterprise\u90fd\u662f\u7f8e\u56fd\u901a\u7528\u7535\u6c14\uff08GE\uff09\u516c\u53f8\u7684\u4ea7\u54c1\u3002GE Digital Energy MDS PulseNET\u662f\u4e00\u5957\u76d1\u63a7\u5de5\u4e1a\u901a\u8baf\u7f51\u7edc\u8bbe\u5907\u7684\u8f6f\u4ef6\u5e94\u7528\u7a0b\u5e8f\u3002MDS PulseNET Enterprise\u662f\u5176\u4e2d\u7684\u4e00\u4e2a\u4f01\u4e1a\u7248\u3002\r\n\r\nGE Digital Energy MDS PulseNET\u548cMDS PulseNET Enterprise 3.1.5\u4e4b\u524d\u7248\u672c\u7684FileDownloadServlet\u4e2d\u7684\u4e0b\u8f7d\u529f\u80fd\u5b58\u5728\u7edd\u5bf9\u8def\u5f84\u904d\u5386\u6f0f\u6d1e\u3002\u8fdc\u7a0b\u653b\u51fb\u8005\u53ef\u901a\u8fc7\u5b8c\u6574\u7684\u8def\u5f84\u540d\u5229\u7528\u8be5\u6f0f\u6d1e\u8bfb\u53d6\u6216\u5220\u9664\u4efb\u610f\u6587\u4ef6\u3002",
"discovererName": "Andrea Micalizzi (rgod)",
"formalWay": "\u7528\u6237\u53ef\u53c2\u8003\u5982\u4e0b\u4f9b\u5e94\u5546\u63d0\u4f9b\u7684\u5b89\u5168\u516c\u544a\u83b7\u5f97\u8865\u4e01\u4fe1\u606f\uff1a\r\nhttps://ics-cert.us-cert.gov/advisories/ICSA-15-258-03",
"isEvent": "\u901a\u7528\u8f6f\u786c\u4ef6\u6f0f\u6d1e",
"number": "CNVD-2015-06254",
"openTime": "2015-09-29",
"patchDescription": "GE Digital Energy MDS PulseNET\u548cMDS PulseNET Enterprise\u90fd\u662f\u7f8e\u56fd\u901a\u7528\u7535\u6c14\uff08GE\uff09\u516c\u53f8\u7684\u4ea7\u54c1\u3002GE Digital Energy MDS PulseNET\u662f\u4e00\u5957\u76d1\u63a7\u5de5\u4e1a\u901a\u8baf\u7f51\u7edc\u8bbe\u5907\u7684\u8f6f\u4ef6\u5e94\u7528\u7a0b\u5e8f\u3002MDS PulseNET Enterprise\u662f\u5176\u4e2d\u7684\u4e00\u4e2a\u4f01\u4e1a\u7248\u3002 \r\n\r\nGE Digital Energy MDS PulseNET\u548cMDS PulseNET Enterprise 3.1.5\u4e4b\u524d\u7248\u672c\u7684FileDownloadServlet\u4e2d\u7684\u4e0b\u8f7d\u529f\u80fd\u5b58\u5728\u7edd\u5bf9\u8def\u5f84\u904d\u5386\u6f0f\u6d1e\u3002\u8fdc\u7a0b\u653b\u51fb\u8005\u53ef\u901a\u8fc7\u5b8c\u6574\u7684\u8def\u5f84\u540d\u5229\u7528\u8be5\u6f0f\u6d1e\u8bfb\u53d6\u6216\u5220\u9664\u4efb\u610f\u6587\u4ef6\u3002\u76ee\u524d\uff0c\u4f9b\u5e94\u5546\u53d1\u5e03\u4e86\u5b89\u5168\u516c\u544a\u53ca\u76f8\u5173\u8865\u4e01\u4fe1\u606f\uff0c\u4fee\u590d\u4e86\u6b64\u6f0f\u6d1e\u3002",
"patchName": "GE Digital Energy MDS PulseNET\u548cMDS PulseNET Enterprise\u7edd\u5bf9\u8def\u5f84\u904d\u5386\u6f0f\u6d1e\u7684\u8865\u4e01",
"products": {
"product": "General Electric Company MDS PulseNET"
},
"referenceLink": "https://ics-cert.us-cert.gov/advisories/ICSA-15-258-03\r\nhttp://zerodayinitiative.com/advisories/ZDI-15-439/",
"serverity": "\u9ad8",
"submitTime": "2015-09-23",
"title": "GE Digital Energy MDS PulseNET\u548cMDS PulseNET Enterprise\u7edd\u5bf9\u8def\u5f84\u904d\u5386\u6f0f\u6d1e"
}
Loading…
Loading…
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.
Loading…
Loading…