VAR-201208-0747

Vulnerability from variot - Updated: 2022-05-17 02:02

IOServer is an industrial control software running on Windows that includes a built-in web server to support XML server functionality. Before IOServer 1.0.19.0 version did not correctly filter the URL, the input is used to display the file, and any file content can be downloaded and leaked through the directory traversal sequence. Successful exploitation of this vulnerability requires the \"XML Server\" to be enabled. IOServer is prone to a directory-traversal vulnerability because it fails to sufficiently sanitize user-supplied input. A remote attacker could exploit this vulnerability using directory-traversal strings (such as '../') to access arbitrary files within or outside of the XML server root directory. This could help the attacker launch further attacks. IOServer 1.0.18.0 and prior versions are vulnerable

Show details on source website

{
  "@context": {
    "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#",
    "affected_products": {
      "@id": "https://www.variotdbs.pl/ref/affected_products"
    },
    "configurations": {
      "@id": "https://www.variotdbs.pl/ref/configurations"
    },
    "credits": {
      "@id": "https://www.variotdbs.pl/ref/credits"
    },
    "cvss": {
      "@id": "https://www.variotdbs.pl/ref/cvss/"
    },
    "description": {
      "@id": "https://www.variotdbs.pl/ref/description/"
    },
    "exploit_availability": {
      "@id": "https://www.variotdbs.pl/ref/exploit_availability/"
    },
    "external_ids": {
      "@id": "https://www.variotdbs.pl/ref/external_ids/"
    },
    "iot": {
      "@id": "https://www.variotdbs.pl/ref/iot/"
    },
    "iot_taxonomy": {
      "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/"
    },
    "patch": {
      "@id": "https://www.variotdbs.pl/ref/patch/"
    },
    "problemtype_data": {
      "@id": "https://www.variotdbs.pl/ref/problemtype_data/"
    },
    "references": {
      "@id": "https://www.variotdbs.pl/ref/references/"
    },
    "sources": {
      "@id": "https://www.variotdbs.pl/ref/sources/"
    },
    "sources_release_date": {
      "@id": "https://www.variotdbs.pl/ref/sources_release_date/"
    },
    "sources_update_date": {
      "@id": "https://www.variotdbs.pl/ref/sources_update_date/"
    },
    "threat_type": {
      "@id": "https://www.variotdbs.pl/ref/threat_type/"
    },
    "title": {
      "@id": "https://www.variotdbs.pl/ref/title/"
    },
    "type": {
      "@id": "https://www.variotdbs.pl/ref/type/"
    }
  },
  "@id": "https://www.variotdbs.pl/vuln/VAR-201208-0747",
  "affected_products": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/affected_products#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        },
        "@id": "https://www.variotdbs.pl/ref/sources"
      }
    },
    "data": [
      {
        "model": "ioserver",
        "scope": "eq",
        "trust": 0.6,
        "vendor": "ioserver",
        "version": "1.0.18.0"
      },
      {
        "model": null,
        "scope": "eq",
        "trust": 0.4,
        "vendor": "ioserver",
        "version": "*"
      },
      {
        "model": null,
        "scope": "eq",
        "trust": 0.4,
        "vendor": "ioserver",
        "version": "1.0.18.0"
      }
    ],
    "sources": [
      {
        "db": "IVD",
        "id": "7d764e20-463f-11e9-8a6c-000c29342cb1"
      },
      {
        "db": "IVD",
        "id": "41afb5ba-1f5b-11e6-abef-000c29c66e3d"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2012-7652"
      }
    ]
  },
  "credits": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/credits#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "hinge",
    "sources": [
      {
        "db": "BID",
        "id": "55093"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201210-666"
      }
    ],
    "trust": 0.9
  },
  "cvss": {
    "@context": {
      "cvssV2": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2"
      },
      "cvssV3": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/"
      },
      "severity": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/cvss/severity#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/severity"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        },
        "@id": "https://www.variotdbs.pl/ref/sources"
      }
    },
    "data": [
      {
        "cvssV2": [
          {
            "accessComplexity": "LOW",
            "accessVector": "NETWORK",
            "authentication": "NONE",
            "author": "CNVD",
            "availabilityImpact": "NONE",
            "baseScore": 5.0,
            "confidentialityImpact": "PARTIAL",
            "exploitabilityScore": 10.0,
            "id": "CNVD-2012-7652",
            "impactScore": 2.9,
            "integrityImpact": "NONE",
            "severity": "MEDIUM",
            "trust": 0.6,
            "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N",
            "version": "2.0"
          },
          {
            "accessComplexity": "LOW",
            "accessVector": "NETWORK",
            "authentication": "NONE",
            "author": "IVD",
            "availabilityImpact": "NONE",
            "baseScore": 5.0,
            "confidentialityImpact": "PARTIAL",
            "exploitabilityScore": 10.0,
            "id": "7d764e20-463f-11e9-8a6c-000c29342cb1",
            "impactScore": 2.9,
            "integrityImpact": "NONE",
            "severity": "MEDIUM",
            "trust": 0.2,
            "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N",
            "version": "2.9 [IVD]"
          },
          {
            "accessComplexity": "LOW",
            "accessVector": "NETWORK",
            "authentication": "NONE",
            "author": "IVD",
            "availabilityImpact": "NONE",
            "baseScore": 5.0,
            "confidentialityImpact": "PARTIAL",
            "exploitabilityScore": 10.0,
            "id": "41afb5ba-1f5b-11e6-abef-000c29c66e3d",
            "impactScore": 2.9,
            "integrityImpact": "NONE",
            "severity": "MEDIUM",
            "trust": 0.2,
            "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N",
            "version": "2.9 [IVD]"
          }
        ],
        "cvssV3": [],
        "severity": [
          {
            "author": "CNVD",
            "id": "CNVD-2012-7652",
            "trust": 0.6,
            "value": "MEDIUM"
          },
          {
            "author": "IVD",
            "id": "7d764e20-463f-11e9-8a6c-000c29342cb1",
            "trust": 0.2,
            "value": "MEDIUM"
          },
          {
            "author": "IVD",
            "id": "41afb5ba-1f5b-11e6-abef-000c29c66e3d",
            "trust": 0.2,
            "value": "MEDIUM"
          }
        ]
      }
    ],
    "sources": [
      {
        "db": "IVD",
        "id": "7d764e20-463f-11e9-8a6c-000c29342cb1"
      },
      {
        "db": "IVD",
        "id": "41afb5ba-1f5b-11e6-abef-000c29c66e3d"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2012-7652"
      }
    ]
  },
  "description": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/description#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "IOServer is an industrial control software running on Windows that includes a built-in web server to support XML server functionality. Before IOServer 1.0.19.0 version did not correctly filter the URL, the input is used to display the file, and any file content can be downloaded and leaked through the directory traversal sequence. Successful exploitation of this vulnerability requires the \\\"XML Server\\\" to be enabled. IOServer is prone to a directory-traversal vulnerability because it fails to sufficiently sanitize user-supplied input. \nA remote attacker could exploit this vulnerability using  directory-traversal strings (such as \u0027../\u0027) to access arbitrary files within or outside of the XML server root directory. This could help the  attacker launch further attacks. \nIOServer 1.0.18.0 and prior versions are vulnerable",
    "sources": [
      {
        "db": "CNVD",
        "id": "CNVD-2012-7652"
      },
      {
        "db": "BID",
        "id": "55093"
      },
      {
        "db": "IVD",
        "id": "7d764e20-463f-11e9-8a6c-000c29342cb1"
      },
      {
        "db": "IVD",
        "id": "41afb5ba-1f5b-11e6-abef-000c29c66e3d"
      }
    ],
    "trust": 1.17
  },
  "external_ids": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/external_ids#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "db": "BID",
        "id": "55093",
        "trust": 1.5
      },
      {
        "db": "CNVD",
        "id": "CNVD-2012-7652",
        "trust": 1.0
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201210-666",
        "trust": 0.6
      },
      {
        "db": "IVD",
        "id": "7D764E20-463F-11E9-8A6C-000C29342CB1",
        "trust": 0.2
      },
      {
        "db": "IVD",
        "id": "41AFB5BA-1F5B-11E6-ABEF-000C29C66E3D",
        "trust": 0.2
      }
    ],
    "sources": [
      {
        "db": "IVD",
        "id": "7d764e20-463f-11e9-8a6c-000c29342cb1"
      },
      {
        "db": "IVD",
        "id": "41afb5ba-1f5b-11e6-abef-000c29c66e3d"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2012-7652"
      },
      {
        "db": "BID",
        "id": "55093"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201210-666"
      }
    ]
  },
  "id": "VAR-201208-0747",
  "iot": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/iot#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": true,
    "sources": [
      {
        "db": "IVD",
        "id": "7d764e20-463f-11e9-8a6c-000c29342cb1"
      },
      {
        "db": "IVD",
        "id": "41afb5ba-1f5b-11e6-abef-000c29c66e3d"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2012-7652"
      }
    ],
    "trust": 0.1
  },
  "iot_taxonomy": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/iot_taxonomy#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "category": [
          "ICS"
        ],
        "sub_category": null,
        "trust": 1.0
      }
    ],
    "sources": [
      {
        "db": "IVD",
        "id": "7d764e20-463f-11e9-8a6c-000c29342cb1"
      },
      {
        "db": "IVD",
        "id": "41afb5ba-1f5b-11e6-abef-000c29c66e3d"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2012-7652"
      }
    ]
  },
  "last_update_date": "2022-05-17T02:02:37.290000Z",
  "references": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/references#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "trust": 0.6,
        "url": "http://www.securityfocus.com/bid/55093/info"
      },
      {
        "trust": 0.6,
        "url": "http://www.securityfocus.com/bid/55093"
      }
    ],
    "sources": [
      {
        "db": "CNVD",
        "id": "CNVD-2012-7652"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201210-666"
      }
    ]
  },
  "sources": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "db": "IVD",
        "id": "7d764e20-463f-11e9-8a6c-000c29342cb1"
      },
      {
        "db": "IVD",
        "id": "41afb5ba-1f5b-11e6-abef-000c29c66e3d"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2012-7652"
      },
      {
        "db": "BID",
        "id": "55093"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201210-666"
      }
    ]
  },
  "sources_release_date": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "date": "2012-08-17T00:00:00",
        "db": "IVD",
        "id": "7d764e20-463f-11e9-8a6c-000c29342cb1"
      },
      {
        "date": "2012-08-17T00:00:00",
        "db": "IVD",
        "id": "41afb5ba-1f5b-11e6-abef-000c29c66e3d"
      },
      {
        "date": "2012-08-17T00:00:00",
        "db": "CNVD",
        "id": "CNVD-2012-7652"
      },
      {
        "date": "2012-08-17T00:00:00",
        "db": "BID",
        "id": "55093"
      },
      {
        "date": "2012-08-17T00:00:00",
        "db": "CNNVD",
        "id": "CNNVD-201210-666"
      }
    ]
  },
  "sources_update_date": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "date": "2012-08-17T00:00:00",
        "db": "CNVD",
        "id": "CNVD-2012-7652"
      },
      {
        "date": "2012-08-17T00:00:00",
        "db": "BID",
        "id": "55093"
      },
      {
        "date": "2012-10-29T00:00:00",
        "db": "CNNVD",
        "id": "CNNVD-201210-666"
      }
    ]
  },
  "threat_type": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/threat_type#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "remote",
    "sources": [
      {
        "db": "CNNVD",
        "id": "CNNVD-201210-666"
      }
    ],
    "trust": 0.6
  },
  "title": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/title#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "IOServer Remote Directory Traversal Vulnerability",
    "sources": [
      {
        "db": "IVD",
        "id": "7d764e20-463f-11e9-8a6c-000c29342cb1"
      },
      {
        "db": "IVD",
        "id": "41afb5ba-1f5b-11e6-abef-000c29c66e3d"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2012-7652"
      }
    ],
    "trust": 1.0
  },
  "type": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/type#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "Path traversal",
    "sources": [
      {
        "db": "IVD",
        "id": "41afb5ba-1f5b-11e6-abef-000c29c66e3d"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201210-666"
      }
    ],
    "trust": 0.8
  }
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or observed by the user.
  • Confirmed: The vulnerability has been validated from an analyst's perspective.
  • Published Proof of Concept: A public proof of concept is available for this vulnerability.
  • Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
  • Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
  • Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
  • Not confirmed: The user expressed doubt about the validity of the vulnerability.
  • Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.


Loading…

Detection rules are retrieved from Rulezet.

Loading…

Loading…