VAR-201203-0257

Vulnerability from variot - Updated: 2023-12-18 11:38

Absolute path traversal vulnerability in logShow.htm on the Quantum Scalar i500 tape library with firmware before i7.0.3 (604G.GS00100), also distributed as the Dell ML6000 tape library with firmware before A20-00 (590G.GS00100), allows remote attackers to read arbitrary files via a full pathname in the file parameter. Cross scripting and preconfigured password vulnerabilities have been reported to exist in the Quantum Scalar i500, Dell ML6000 and IBM TS3310 tape libraries. (2) http://device/checkQKMProg.htm There is a cross-site scripting vulnerability that allows you to get the session ID. (3) The POST parameter executes any command with the ROOT user. An information-disclosure vulnerability 2. A cross-site request-forgery vulnerability 4. A security-bypass vulnerability An attacker may leverage these issues to execute arbitrary script code in the browser of an unsuspecting user in the context of the affected site. This may let the attacker steal cookie-based authentication credentials and launch other attacks. The information-disclosure vulnerability can allow the attacker to obtain sensitive information that may aid in launching further attacks. Exploiting the cross-site request-forgery may allow a remote attacker to perform certain administrative actions and gain unauthorized access to the affected application. Other attacks are also possible. Attackers can exploit a password weakness issue to bypass security restrictions to obtain sensitive information or perform unauthorized actions; this may aid in launching further attacks. ----------------------------------------------------------------------

Become a PSI 3.0 beta tester! Test-drive the new beta version and tell us what you think about its extended automatic update function and significantly enhanced user-interface. Download it here! http://secunia.com/psi_30_beta_launch


TITLE: Quantum Scalar i500 Multiple Vulnerabilities

SECUNIA ADVISORY ID: SA48403

VERIFY ADVISORY: Secunia.com http://secunia.com/advisories/48403/ Customer Area (Credentials Required) https://ca.secunia.com/?page=viewadvisory&vuln_id=48403

RELEASE DATE: 2012-03-20

DISCUSS ADVISORY: http://secunia.com/advisories/48403/#comments

AVAILABLE ON SITE AND IN CUSTOMER AREA: * Last Update * Popularity * Comments * Criticality Level * Impact * Where * Solution Status * Operating System / Software * CVE Reference(s)

http://secunia.com/advisories/48403/

ONLY AVAILABLE IN CUSTOMER AREA: * Authentication Level * Report Reliability * Secunia PoC * Secunia Analysis * Systems Affected * Approve Distribution * Remediation Status * Secunia CVSS Score * CVSS

https://ca.secunia.com/?page=viewadvisory&vuln_id=48403

ONLY AVAILABLE WITH SECUNIA CSI AND SECUNIA PSI: * AUTOMATED SCANNING

http://secunia.com/vulnerability_scanning/personal/ http://secunia.com/vulnerability_scanning/corporate/wsus_sccm_3rd_third_party_patching/

DESCRIPTION: Multiple vulnerabilities have been reported in Quantum Scalar i500, which can be exploited by malicious people to disclose potentially sensitive information and conduct cross-site scripting and request forgery attacks.

1) Input passed via e.g. the "file" parameter to logShow.html is not properly verified before being used to display files. This can be exploited to disclose the contents of arbitrary files via directory traversal sequences.

2) Certain input passed via checkQKMProg.htm is not properly sanitised before being returned to the user. This can be exploited to e.g.

SOLUTION: Update to firmware version i7.0.3 (604G.GS00100) or later.

PROVIDED AND/OR DISCOVERED BY: US-CERT credits NOAA CIRT.

ORIGINAL ADVISORY: US-CERT: http://www.kb.cert.org/vuls/id/913483

OTHER REFERENCES: Further details available in Customer Area: http://secunia.com/vulnerability_intelligence/

DEEP LINKS: Further details available in Customer Area: http://secunia.com/vulnerability_intelligence/

EXTENDED DESCRIPTION: Further details available in Customer Area: http://secunia.com/vulnerability_intelligence/

EXTENDED SOLUTION: Further details available in Customer Area: http://secunia.com/vulnerability_intelligence/

EXPLOIT: Further details available in Customer Area: http://secunia.com/vulnerability_intelligence/


About: This Advisory was delivered by Secunia as a free service to help private users keeping their systems up to date against the latest vulnerabilities.

Subscribe: http://secunia.com/advisories/secunia_security_advisories/

Definitions: (Criticality, Where etc.) http://secunia.com/advisories/about_secunia_advisories/

Please Note: Secunia recommends that you verify all advisories you receive by clicking the link. Secunia NEVER sends attached files with advisories. Secunia does not advise people to install third party patches, only use those supplied by the vendor.


Unsubscribe: Secunia Security Advisories http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org


Show details on source website

{
  "@context": {
    "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#",
    "affected_products": {
      "@id": "https://www.variotdbs.pl/ref/affected_products"
    },
    "configurations": {
      "@id": "https://www.variotdbs.pl/ref/configurations"
    },
    "credits": {
      "@id": "https://www.variotdbs.pl/ref/credits"
    },
    "cvss": {
      "@id": "https://www.variotdbs.pl/ref/cvss/"
    },
    "description": {
      "@id": "https://www.variotdbs.pl/ref/description/"
    },
    "exploit_availability": {
      "@id": "https://www.variotdbs.pl/ref/exploit_availability/"
    },
    "external_ids": {
      "@id": "https://www.variotdbs.pl/ref/external_ids/"
    },
    "iot": {
      "@id": "https://www.variotdbs.pl/ref/iot/"
    },
    "iot_taxonomy": {
      "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/"
    },
    "patch": {
      "@id": "https://www.variotdbs.pl/ref/patch/"
    },
    "problemtype_data": {
      "@id": "https://www.variotdbs.pl/ref/problemtype_data/"
    },
    "references": {
      "@id": "https://www.variotdbs.pl/ref/references/"
    },
    "sources": {
      "@id": "https://www.variotdbs.pl/ref/sources/"
    },
    "sources_release_date": {
      "@id": "https://www.variotdbs.pl/ref/sources_release_date/"
    },
    "sources_update_date": {
      "@id": "https://www.variotdbs.pl/ref/sources_update_date/"
    },
    "threat_type": {
      "@id": "https://www.variotdbs.pl/ref/threat_type/"
    },
    "title": {
      "@id": "https://www.variotdbs.pl/ref/title/"
    },
    "type": {
      "@id": "https://www.variotdbs.pl/ref/type/"
    }
  },
  "@id": "https://www.variotdbs.pl/vuln/VAR-201203-0257",
  "affected_products": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/affected_products#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        },
        "@id": "https://www.variotdbs.pl/ref/sources"
      }
    },
    "data": [
      {
        "model": "powervault ml6000",
        "scope": "eq",
        "trust": 1.6,
        "vendor": "dell",
        "version": "585g.gs003"
      },
      {
        "model": "scalar i500",
        "scope": "eq",
        "trust": 1.5,
        "vendor": "quantum",
        "version": "0"
      },
      {
        "model": "ml6000",
        "scope": "eq",
        "trust": 1.5,
        "vendor": "dell",
        "version": "0"
      },
      {
        "model": "ts3310",
        "scope": "eq",
        "trust": 1.5,
        "vendor": "ibm",
        "version": "0"
      },
      {
        "model": "scalar i500",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "quantum",
        "version": "i7"
      },
      {
        "model": "scalar i500",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "quantum",
        "version": "i5.1"
      },
      {
        "model": "scalar i500",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "quantum",
        "version": "14u"
      },
      {
        "model": "scalar i500",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "quantum",
        "version": "i3.1"
      },
      {
        "model": "scalar i500",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "quantum",
        "version": "5u"
      },
      {
        "model": "powervault ml6020",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "dell",
        "version": "14u"
      },
      {
        "model": "scalar i500",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "quantum",
        "version": "i5"
      },
      {
        "model": "scalar i500",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "quantum",
        "version": "sp4"
      },
      {
        "model": "scalar i500",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "quantum",
        "version": "i6.1"
      },
      {
        "model": "scalar i500",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "quantum",
        "version": "23u"
      },
      {
        "model": "scalar i500",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "quantum",
        "version": "i3"
      },
      {
        "model": "scalar i500",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "quantum",
        "version": "i2"
      },
      {
        "model": "powervault ml6000",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "dell",
        "version": "41u"
      },
      {
        "model": "scalar i500",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "quantum",
        "version": "i6"
      },
      {
        "model": "powervault ml6000",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "dell",
        "version": "32u"
      },
      {
        "model": "scalar i500",
        "scope": "lte",
        "trust": 1.0,
        "vendor": "quantum",
        "version": "i7.0.2"
      },
      {
        "model": "powervault ml6010",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "dell",
        "version": "5u"
      },
      {
        "model": "powervault ml6030",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "dell",
        "version": "23u"
      },
      {
        "model": "scalar i500",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "quantum",
        "version": "sp4.2"
      },
      {
        "model": "scalar i500",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "quantum",
        "version": "i7.0.1"
      },
      {
        "model": "scalar i500",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "quantum",
        "version": "i4"
      },
      {
        "model": null,
        "scope": null,
        "trust": 0.8,
        "vendor": "dell computer",
        "version": null
      },
      {
        "model": null,
        "scope": null,
        "trust": 0.8,
        "vendor": "ibm",
        "version": null
      },
      {
        "model": null,
        "scope": null,
        "trust": 0.8,
        "vendor": "quantum",
        "version": null
      },
      {
        "model": "scalar i500",
        "scope": "lt",
        "trust": 0.8,
        "vendor": "quantum",
        "version": "14u firmware  i7.0.3 (604g.gs00100)"
      },
      {
        "model": "scalar i500",
        "scope": "lt",
        "trust": 0.8,
        "vendor": "quantum",
        "version": "23u firmware  i7.0.3 (604g.gs00100)"
      },
      {
        "model": "scalar i500",
        "scope": "lt",
        "trust": 0.8,
        "vendor": "quantum",
        "version": "5u firmware  i7.0.3 (604g.gs00100)"
      },
      {
        "model": "scalar i500",
        "scope": "lt",
        "trust": 0.8,
        "vendor": "quantum",
        "version": "i7.0.3 (604g.gs00100)"
      },
      {
        "model": "powervault ml6000",
        "scope": "lt",
        "trust": 0.8,
        "vendor": "dell",
        "version": "32u firmware  a20-00 (590g.gs00100)"
      },
      {
        "model": "powervault ml6000",
        "scope": "lt",
        "trust": 0.8,
        "vendor": "dell",
        "version": "41u firmware  a20-00 (590g.gs00100)"
      },
      {
        "model": "powervault ml6000",
        "scope": "lt",
        "trust": 0.8,
        "vendor": "dell",
        "version": "a20-00 (590g.gs00100)"
      },
      {
        "model": "powervault ml6010",
        "scope": "lt",
        "trust": 0.8,
        "vendor": "dell",
        "version": "5u firmware  a20-00 (590g.gs00100)"
      },
      {
        "model": "powervault ml6020",
        "scope": "lt",
        "trust": 0.8,
        "vendor": "dell",
        "version": "14u firmware  a20-00 (590g.gs00100)"
      },
      {
        "model": "powervault ml6030",
        "scope": "lt",
        "trust": 0.8,
        "vendor": "dell",
        "version": "23u firmware  a20-00 (590g.gs00100)"
      },
      {
        "model": "scalar i500 i7.0.3",
        "scope": "ne",
        "trust": 0.3,
        "vendor": "quantum",
        "version": null
      },
      {
        "model": "ts3310 r6c",
        "scope": "ne",
        "trust": 0.3,
        "vendor": "ibm",
        "version": null
      },
      {
        "model": "ml6000 a20-00",
        "scope": "ne",
        "trust": 0.3,
        "vendor": "dell",
        "version": null
      }
    ],
    "sources": [
      {
        "db": "CERT/CC",
        "id": "VU#913483"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2012-1432"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2012-1434"
      },
      {
        "db": "BID",
        "id": "52566"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2012-001911"
      },
      {
        "db": "NVD",
        "id": "CVE-2012-1841"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201203-441"
      }
    ]
  },
  "configurations": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/configurations#",
      "children": {
        "@container": "@list"
      },
      "cpe_match": {
        "@container": "@list"
      },
      "data": {
        "@container": "@list"
      },
      "nodes": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "CVE_data_version": "4.0",
        "nodes": [
          {
            "children": [
              {
                "children": [],
                "cpe_match": [
                  {
                    "cpe23Uri": "cpe:2.3:a:quantum:scalar_i500_firmware:i6.1:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": true
                  },
                  {
                    "cpe23Uri": "cpe:2.3:a:quantum:scalar_i500_firmware:i5.1:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": true
                  },
                  {
                    "cpe23Uri": "cpe:2.3:a:quantum:scalar_i500_firmware:i5:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": true
                  },
                  {
                    "cpe23Uri": "cpe:2.3:a:quantum:scalar_i500_firmware:i6:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": true
                  },
                  {
                    "cpe23Uri": "cpe:2.3:a:quantum:scalar_i500_firmware:sp4:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": true
                  },
                  {
                    "cpe23Uri": "cpe:2.3:a:quantum:scalar_i500_firmware:i2:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": true
                  },
                  {
                    "cpe23Uri": "cpe:2.3:a:quantum:scalar_i500_firmware:*:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "versionEndIncluding": "i7.0.2",
                    "vulnerable": true
                  },
                  {
                    "cpe23Uri": "cpe:2.3:a:quantum:scalar_i500_firmware:i4:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": true
                  },
                  {
                    "cpe23Uri": "cpe:2.3:a:quantum:scalar_i500_firmware:i3.1:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": true
                  },
                  {
                    "cpe23Uri": "cpe:2.3:a:quantum:scalar_i500_firmware:i7.0.1:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": true
                  },
                  {
                    "cpe23Uri": "cpe:2.3:a:quantum:scalar_i500_firmware:i7:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": true
                  },
                  {
                    "cpe23Uri": "cpe:2.3:a:quantum:scalar_i500_firmware:i3:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": true
                  },
                  {
                    "cpe23Uri": "cpe:2.3:a:quantum:scalar_i500_firmware:sp4.2:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": true
                  }
                ],
                "operator": "OR"
              },
              {
                "children": [],
                "cpe_match": [
                  {
                    "cpe23Uri": "cpe:2.3:h:quantum:scalar_i500:14u:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": true
                  },
                  {
                    "cpe23Uri": "cpe:2.3:h:quantum:scalar_i500:23u:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": true
                  },
                  {
                    "cpe23Uri": "cpe:2.3:h:quantum:scalar_i500:5u:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": true
                  }
                ],
                "operator": "OR"
              }
            ],
            "cpe_match": [],
            "operator": "AND"
          },
          {
            "children": [
              {
                "children": [],
                "cpe_match": [
                  {
                    "cpe23Uri": "cpe:2.3:a:dell:powervault_ml6000_firmware:585g.gs003:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": true
                  }
                ],
                "operator": "OR"
              },
              {
                "children": [],
                "cpe_match": [
                  {
                    "cpe23Uri": "cpe:2.3:h:dell:powervault_ml6020:14u:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": true
                  },
                  {
                    "cpe23Uri": "cpe:2.3:h:dell:powervault_ml6030:23u:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": true
                  },
                  {
                    "cpe23Uri": "cpe:2.3:h:dell:powervault_ml6010:5u:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": true
                  },
                  {
                    "cpe23Uri": "cpe:2.3:h:dell:powervault_ml6000:41u:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": true
                  },
                  {
                    "cpe23Uri": "cpe:2.3:h:dell:powervault_ml6000:32u:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": true
                  }
                ],
                "operator": "OR"
              }
            ],
            "cpe_match": [],
            "operator": "AND"
          }
        ]
      }
    ],
    "sources": [
      {
        "db": "NVD",
        "id": "CVE-2012-1841"
      }
    ]
  },
  "credits": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/credits#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "NOAA CIRT",
    "sources": [
      {
        "db": "BID",
        "id": "52566"
      }
    ],
    "trust": 0.3
  },
  "cve": "CVE-2012-1841",
  "cvss": {
    "@context": {
      "cvssV2": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2"
      },
      "cvssV3": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/"
      },
      "severity": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/cvss/severity#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/severity"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        },
        "@id": "https://www.variotdbs.pl/ref/sources"
      }
    },
    "data": [
      {
        "cvssV2": [
          {
            "acInsufInfo": false,
            "accessComplexity": "LOW",
            "accessVector": "NETWORK",
            "authentication": "NONE",
            "author": "NVD",
            "availabilityImpact": "NONE",
            "baseScore": 5.0,
            "confidentialityImpact": "PARTIAL",
            "exploitabilityScore": 10.0,
            "impactScore": 2.9,
            "integrityImpact": "NONE",
            "obtainAllPrivilege": false,
            "obtainOtherPrivilege": false,
            "obtainUserPrivilege": false,
            "severity": "MEDIUM",
            "trust": 1.0,
            "userInteractionRequired": false,
            "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N",
            "version": "2.0"
          },
          {
            "acInsufInfo": null,
            "accessComplexity": "Low",
            "accessVector": "Network",
            "authentication": "None",
            "author": "NVD",
            "availabilityImpact": "None",
            "baseScore": 5.0,
            "confidentialityImpact": "Partial",
            "exploitabilityScore": null,
            "id": "CVE-2012-1841",
            "impactScore": null,
            "integrityImpact": "None",
            "obtainAllPrivilege": null,
            "obtainOtherPrivilege": null,
            "obtainUserPrivilege": null,
            "severity": "Medium",
            "trust": 0.8,
            "userInteractionRequired": null,
            "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N",
            "version": "2.0"
          },
          {
            "accessComplexity": "LOW",
            "accessVector": "NETWORK",
            "authentication": "NONE",
            "author": "VULHUB",
            "availabilityImpact": "NONE",
            "baseScore": 5.0,
            "confidentialityImpact": "PARTIAL",
            "exploitabilityScore": 10.0,
            "id": "VHN-55122",
            "impactScore": 2.9,
            "integrityImpact": "NONE",
            "severity": "MEDIUM",
            "trust": 0.1,
            "vectorString": "AV:N/AC:L/AU:N/C:P/I:N/A:N",
            "version": "2.0"
          }
        ],
        "cvssV3": [],
        "severity": [
          {
            "author": "NVD",
            "id": "CVE-2012-1841",
            "trust": 1.8,
            "value": "MEDIUM"
          },
          {
            "author": "CNNVD",
            "id": "CNNVD-201203-441",
            "trust": 0.6,
            "value": "MEDIUM"
          },
          {
            "author": "VULHUB",
            "id": "VHN-55122",
            "trust": 0.1,
            "value": "MEDIUM"
          }
        ]
      }
    ],
    "sources": [
      {
        "db": "VULHUB",
        "id": "VHN-55122"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2012-001911"
      },
      {
        "db": "NVD",
        "id": "CVE-2012-1841"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201203-441"
      }
    ]
  },
  "description": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/description#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "Absolute path traversal vulnerability in logShow.htm on the Quantum Scalar i500 tape library with firmware before i7.0.3 (604G.GS00100), also distributed as the Dell ML6000 tape library with firmware before A20-00 (590G.GS00100), allows remote attackers to read arbitrary files via a full pathname in the file parameter. Cross scripting and preconfigured password vulnerabilities have been reported to exist in the Quantum Scalar i500, Dell ML6000 and IBM TS3310 tape libraries. (2) http://device/checkQKMProg.htm There is a cross-site scripting vulnerability that allows you to get the session ID. (3) The POST parameter executes any command with the ROOT user. An information-disclosure vulnerability\n2. A cross-site request-forgery vulnerability\n4. A security-bypass vulnerability\nAn attacker may leverage these issues to execute arbitrary script code in the browser of an unsuspecting user in the context of the affected site. This may let the attacker steal cookie-based authentication credentials and launch other attacks. The information-disclosure vulnerability can allow the attacker to obtain sensitive information that may aid in launching further attacks. \nExploiting the cross-site request-forgery may allow a remote attacker to perform certain administrative actions and gain unauthorized access to the affected application. Other attacks are also possible. \nAttackers can exploit a password weakness issue  to bypass security restrictions to obtain sensitive information or  perform unauthorized actions; this may aid in launching further attacks. ----------------------------------------------------------------------\n\nBecome a PSI 3.0 beta tester!\nTest-drive the new beta version and tell us what you think about its extended automatic update function and significantly enhanced user-interface. \nDownload it here!\nhttp://secunia.com/psi_30_beta_launch\n\n----------------------------------------------------------------------\n\nTITLE:\nQuantum Scalar i500 Multiple Vulnerabilities\n\nSECUNIA ADVISORY ID:\nSA48403\n\nVERIFY ADVISORY:\nSecunia.com\nhttp://secunia.com/advisories/48403/\nCustomer Area (Credentials Required)\nhttps://ca.secunia.com/?page=viewadvisory\u0026vuln_id=48403\n\nRELEASE DATE:\n2012-03-20\n\nDISCUSS ADVISORY:\nhttp://secunia.com/advisories/48403/#comments\n\nAVAILABLE ON SITE AND IN CUSTOMER AREA:\n * Last Update\n * Popularity\n * Comments\n * Criticality Level\n * Impact\n * Where\n * Solution Status\n * Operating System / Software\n * CVE Reference(s)\n\nhttp://secunia.com/advisories/48403/\n\nONLY AVAILABLE IN CUSTOMER AREA:\n * Authentication Level\n * Report Reliability\n * Secunia PoC\n * Secunia Analysis\n * Systems Affected\n * Approve Distribution\n * Remediation Status\n * Secunia CVSS Score\n * CVSS\n\nhttps://ca.secunia.com/?page=viewadvisory\u0026vuln_id=48403\n\nONLY AVAILABLE WITH SECUNIA CSI AND SECUNIA PSI:\n * AUTOMATED SCANNING\n\nhttp://secunia.com/vulnerability_scanning/personal/\nhttp://secunia.com/vulnerability_scanning/corporate/wsus_sccm_3rd_third_party_patching/\n\nDESCRIPTION:\nMultiple vulnerabilities have been reported in Quantum Scalar i500,\nwhich can be exploited by malicious people to disclose potentially\nsensitive information and conduct cross-site scripting and request\nforgery attacks. \n\n1) Input passed via e.g. the \"file\" parameter to logShow.html is not\nproperly verified before being used to display files. This can be\nexploited to disclose the contents of arbitrary files via directory\ntraversal sequences. \n\n2) Certain input passed via checkQKMProg.htm is not properly\nsanitised before being returned to the user. This can be exploited to e.g. \n\nSOLUTION:\nUpdate to firmware version i7.0.3 (604G.GS00100) or later. \n\nPROVIDED AND/OR DISCOVERED BY:\nUS-CERT credits NOAA CIRT. \n\nORIGINAL ADVISORY:\nUS-CERT:\nhttp://www.kb.cert.org/vuls/id/913483\n\nOTHER REFERENCES:\nFurther details available in Customer Area:\nhttp://secunia.com/vulnerability_intelligence/\n\nDEEP LINKS:\nFurther details available in Customer Area:\nhttp://secunia.com/vulnerability_intelligence/\n\nEXTENDED DESCRIPTION:\nFurther details available in Customer Area:\nhttp://secunia.com/vulnerability_intelligence/\n\nEXTENDED SOLUTION:\nFurther details available in Customer Area:\nhttp://secunia.com/vulnerability_intelligence/\n\nEXPLOIT:\nFurther details available in Customer Area:\nhttp://secunia.com/vulnerability_intelligence/\n\n----------------------------------------------------------------------\n\nAbout:\nThis Advisory was delivered by Secunia as a free service to help\nprivate users keeping their systems up to date against the latest\nvulnerabilities. \n\nSubscribe:\nhttp://secunia.com/advisories/secunia_security_advisories/\n\nDefinitions: (Criticality, Where etc.)\nhttp://secunia.com/advisories/about_secunia_advisories/\n\n\nPlease Note:\nSecunia recommends that you verify all advisories you receive by\nclicking the link. \nSecunia NEVER sends attached files with advisories. \nSecunia does not advise people to install third party patches, only\nuse those supplied by the vendor. \n\n----------------------------------------------------------------------\n\nUnsubscribe: Secunia Security Advisories\nhttp://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org\n\n----------------------------------------------------------------------\n\n\n",
    "sources": [
      {
        "db": "NVD",
        "id": "CVE-2012-1841"
      },
      {
        "db": "CERT/CC",
        "id": "VU#913483"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2012-001911"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2012-1432"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2012-1434"
      },
      {
        "db": "BID",
        "id": "52566"
      },
      {
        "db": "VULHUB",
        "id": "VHN-55122"
      },
      {
        "db": "PACKETSTORM",
        "id": "111009"
      },
      {
        "db": "PACKETSTORM",
        "id": "111008"
      }
    ],
    "trust": 3.96
  },
  "external_ids": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/external_ids#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "db": "CERT/CC",
        "id": "VU#913483",
        "trust": 5.0
      },
      {
        "db": "NVD",
        "id": "CVE-2012-1841",
        "trust": 2.8
      },
      {
        "db": "BID",
        "id": "52566",
        "trust": 1.5
      },
      {
        "db": "SECUNIA",
        "id": "48453",
        "trust": 1.3
      },
      {
        "db": "SECUNIA",
        "id": "48403",
        "trust": 1.3
      },
      {
        "db": "OSVDB",
        "id": "80226",
        "trust": 1.1
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2012-001911",
        "trust": 0.8
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201203-441",
        "trust": 0.7
      },
      {
        "db": "CNVD",
        "id": "CNVD-2012-1432",
        "trust": 0.6
      },
      {
        "db": "CNVD",
        "id": "CNVD-2012-1434",
        "trust": 0.6
      },
      {
        "db": "CERT/CC",
        "id": "HTTP://WWW.KB.CERT.ORG/VULS/ID/MAPG-8NVRPY",
        "trust": 0.6
      },
      {
        "db": "CERT/CC",
        "id": "HTTP://WWW.KB.CERT.ORG/VULS/ID/MAPG-8NNKN8",
        "trust": 0.6
      },
      {
        "db": "VULHUB",
        "id": "VHN-55122",
        "trust": 0.1
      },
      {
        "db": "PACKETSTORM",
        "id": "111009",
        "trust": 0.1
      },
      {
        "db": "PACKETSTORM",
        "id": "111008",
        "trust": 0.1
      }
    ],
    "sources": [
      {
        "db": "CERT/CC",
        "id": "VU#913483"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2012-1432"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2012-1434"
      },
      {
        "db": "VULHUB",
        "id": "VHN-55122"
      },
      {
        "db": "BID",
        "id": "52566"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2012-001911"
      },
      {
        "db": "PACKETSTORM",
        "id": "111009"
      },
      {
        "db": "PACKETSTORM",
        "id": "111008"
      },
      {
        "db": "NVD",
        "id": "CVE-2012-1841"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201203-441"
      }
    ]
  },
  "id": "VAR-201203-0257",
  "iot": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/iot#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": true,
    "sources": [
      {
        "db": "CNVD",
        "id": "CNVD-2012-1432"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2012-1434"
      },
      {
        "db": "VULHUB",
        "id": "VHN-55122"
      }
    ],
    "trust": 1.99791665
  },
  "iot_taxonomy": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/iot_taxonomy#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "category": [
          "Network device"
        ],
        "sub_category": null,
        "trust": 1.2
      }
    ],
    "sources": [
      {
        "db": "CNVD",
        "id": "CNVD-2012-1432"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2012-1434"
      }
    ]
  },
  "last_update_date": "2023-12-18T11:38:14.703000Z",
  "patch": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/patch#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "title": "Welcome to Dell Technical Support",
        "trust": 0.8,
        "url": "http://support.dell.com/"
      },
      {
        "title": "Scalar i500",
        "trust": 0.8,
        "url": "http://www.quantum.com/serviceandsupport/softwareanddocumentationdownloads/si500/index.aspx"
      },
      {
        "title": "Patch for Quantum Scalar i500, Dell ML6000 and IBM TS3310 Enterprise Tape Library WEB Interface Cross-Site Scripting Vulnerability",
        "trust": 0.6,
        "url": "https://www.cnvd.org.cn/patchinfo/show/14191"
      },
      {
        "title": "Quantum Scalar i500, Dell ML6000 and IBM TS3310 Tape Library Preconfigured Password Vulnerability Patch",
        "trust": 0.6,
        "url": "https://www.cnvd.org.cn/patchinfo/show/14192"
      }
    ],
    "sources": [
      {
        "db": "CNVD",
        "id": "CNVD-2012-1432"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2012-1434"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2012-001911"
      }
    ]
  },
  "problemtype_data": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "problemtype": "CWE-22",
        "trust": 1.9
      }
    ],
    "sources": [
      {
        "db": "VULHUB",
        "id": "VHN-55122"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2012-001911"
      },
      {
        "db": "NVD",
        "id": "CVE-2012-1841"
      }
    ]
  },
  "references": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/references#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "trust": 4.2,
        "url": "http://www.kb.cert.org/vuls/id/913483"
      },
      {
        "trust": 1.9,
        "url": "http://www.quantum.com/serviceandsupport/softwareanddocumentationdownloads/si500/index.aspx"
      },
      {
        "trust": 1.9,
        "url": "http://www-933.ibm.com/support/fixcentral/"
      },
      {
        "trust": 1.7,
        "url": "http://www.kb.cert.org/vuls/id/mapg-8nnkn8"
      },
      {
        "trust": 1.7,
        "url": "http://www.kb.cert.org/vuls/id/mapg-8nvrpy"
      },
      {
        "trust": 1.6,
        "url": "http://support.dell.com"
      },
      {
        "trust": 1.1,
        "url": "http://osvdb.org/80226"
      },
      {
        "trust": 1.1,
        "url": "http://secunia.com/advisories/48403"
      },
      {
        "trust": 1.1,
        "url": "http://secunia.com/advisories/48453"
      },
      {
        "trust": 0.8,
        "url": "http://cwe.mitre.org/data/definitions/552.html"
      },
      {
        "trust": 0.8,
        "url": "http://cwe.mitre.org/data/definitions/200.html"
      },
      {
        "trust": 0.8,
        "url": "http://cwe.mitre.org/data/definitions/352.html"
      },
      {
        "trust": 0.8,
        "url": "http://cwe.mitre.org/data/definitions/259.html"
      },
      {
        "trust": 0.8,
        "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2012-1841"
      },
      {
        "trust": 0.8,
        "url": "http://jvn.jp/cert/jvnvu913483/"
      },
      {
        "trust": 0.8,
        "url": "http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2012-1841"
      },
      {
        "trust": 0.3,
        "url": "http://dell.com"
      },
      {
        "trust": 0.2,
        "url": "http://secunia.com/psi_30_beta_launch"
      },
      {
        "trust": 0.2,
        "url": "http://secunia.com/vulnerability_intelligence/"
      },
      {
        "trust": 0.2,
        "url": "http://secunia.com/vulnerability_scanning/corporate/wsus_sccm_3rd_third_party_patching/"
      },
      {
        "trust": 0.2,
        "url": "http://secunia.com/advisories/secunia_security_advisories/"
      },
      {
        "trust": 0.2,
        "url": "http://secunia.com/advisories/about_secunia_advisories/"
      },
      {
        "trust": 0.2,
        "url": "http://secunia.com/vulnerability_scanning/personal/"
      },
      {
        "trust": 0.2,
        "url": "http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org"
      },
      {
        "trust": 0.1,
        "url": "http://secunia.com/advisories/48453/#comments"
      },
      {
        "trust": 0.1,
        "url": "https://ca.secunia.com/?page=viewadvisory\u0026vuln_id=48453"
      },
      {
        "trust": 0.1,
        "url": "http://secunia.com/advisories/48453/"
      },
      {
        "trust": 0.1,
        "url": "http://secunia.com/advisories/48403/"
      },
      {
        "trust": 0.1,
        "url": "https://ca.secunia.com/?page=viewadvisory\u0026vuln_id=48403"
      },
      {
        "trust": 0.1,
        "url": "http://secunia.com/advisories/48403/#comments"
      }
    ],
    "sources": [
      {
        "db": "CERT/CC",
        "id": "VU#913483"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2012-1432"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2012-1434"
      },
      {
        "db": "VULHUB",
        "id": "VHN-55122"
      },
      {
        "db": "BID",
        "id": "52566"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2012-001911"
      },
      {
        "db": "PACKETSTORM",
        "id": "111009"
      },
      {
        "db": "PACKETSTORM",
        "id": "111008"
      },
      {
        "db": "NVD",
        "id": "CVE-2012-1841"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201203-441"
      }
    ]
  },
  "sources": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "db": "CERT/CC",
        "id": "VU#913483"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2012-1432"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2012-1434"
      },
      {
        "db": "VULHUB",
        "id": "VHN-55122"
      },
      {
        "db": "BID",
        "id": "52566"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2012-001911"
      },
      {
        "db": "PACKETSTORM",
        "id": "111009"
      },
      {
        "db": "PACKETSTORM",
        "id": "111008"
      },
      {
        "db": "NVD",
        "id": "CVE-2012-1841"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201203-441"
      }
    ]
  },
  "sources_release_date": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "date": "2012-03-19T00:00:00",
        "db": "CERT/CC",
        "id": "VU#913483"
      },
      {
        "date": "2012-03-23T00:00:00",
        "db": "CNVD",
        "id": "CNVD-2012-1432"
      },
      {
        "date": "2012-03-23T00:00:00",
        "db": "CNVD",
        "id": "CNVD-2012-1434"
      },
      {
        "date": "2012-03-22T00:00:00",
        "db": "VULHUB",
        "id": "VHN-55122"
      },
      {
        "date": "2012-03-19T00:00:00",
        "db": "BID",
        "id": "52566"
      },
      {
        "date": "2012-03-26T00:00:00",
        "db": "JVNDB",
        "id": "JVNDB-2012-001911"
      },
      {
        "date": "2012-03-20T04:06:39",
        "db": "PACKETSTORM",
        "id": "111009"
      },
      {
        "date": "2012-03-20T04:06:35",
        "db": "PACKETSTORM",
        "id": "111008"
      },
      {
        "date": "2012-03-22T10:17:11.003000",
        "db": "NVD",
        "id": "CVE-2012-1841"
      },
      {
        "date": "2012-03-23T00:00:00",
        "db": "CNNVD",
        "id": "CNNVD-201203-441"
      }
    ]
  },
  "sources_update_date": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "date": "2014-07-29T00:00:00",
        "db": "CERT/CC",
        "id": "VU#913483"
      },
      {
        "date": "2012-03-23T00:00:00",
        "db": "CNVD",
        "id": "CNVD-2012-1432"
      },
      {
        "date": "2012-03-23T00:00:00",
        "db": "CNVD",
        "id": "CNVD-2012-1434"
      },
      {
        "date": "2018-01-10T00:00:00",
        "db": "VULHUB",
        "id": "VHN-55122"
      },
      {
        "date": "2013-03-13T17:25:00",
        "db": "BID",
        "id": "52566"
      },
      {
        "date": "2012-03-26T00:00:00",
        "db": "JVNDB",
        "id": "JVNDB-2012-001911"
      },
      {
        "date": "2018-01-10T02:29:30.270000",
        "db": "NVD",
        "id": "CVE-2012-1841"
      },
      {
        "date": "2012-03-23T00:00:00",
        "db": "CNNVD",
        "id": "CNNVD-201203-441"
      }
    ]
  },
  "threat_type": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/threat_type#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "remote",
    "sources": [
      {
        "db": "CNNVD",
        "id": "CNNVD-201203-441"
      }
    ],
    "trust": 0.6
  },
  "title": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/title#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "Quantum Scalar i500, Dell ML6000 and IBM TS3310 tape libraries web interface and preconfigured password vulnerabilities",
    "sources": [
      {
        "db": "CERT/CC",
        "id": "VU#913483"
      }
    ],
    "trust": 0.8
  },
  "type": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/type#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "path traversal",
    "sources": [
      {
        "db": "CNNVD",
        "id": "CNNVD-201203-441"
      }
    ],
    "trust": 0.6
  }
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or observed by the user.
  • Confirmed: The vulnerability has been validated from an analyst's perspective.
  • Published Proof of Concept: A public proof of concept is available for this vulnerability.
  • Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
  • Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
  • Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
  • Not confirmed: The user expressed doubt about the validity of the vulnerability.
  • Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.


Loading…

Detection rules are retrieved from Rulezet.

Loading…

Loading…