RVD icon indicating copy to clipboard operation
RVD copied to clipboard

RVD#10: Relative Path Traversal vulnerability in SREA-01 and SREA-50

Open aliasbot opened this issue 6 years ago • 3 comments

{
    "id": 10,
    "title": "RVD#10: Relative Path Traversal vulnerability in SREA-01 and SREA-50",
    "type": "vulnerability",
    "description": " Relative Path Traversal vulnerability in SREA-01 and SREA-50 legacy remote monitoring tools and Ethernet adapters in ABB could access files on the affected products' file systems, view data, change configuration, retrieve password hash codes, and potentially insert and send commands to connected devices without authorization via HTTP request which refers to files using ../../ relative paths",
    "cwe": "CWE-22",
    "cve": "CVE-2017-9664",
    "keywords": [
        "components hardware",
        "severity: critical",
        "state: new",
        "vendor: ABB",
        "vulnerability"
    ],
    "system": "SREA-01 rev.A/B/C up to 3.31.5 SREA-50 rev.A up to 3.32.8",
    "vendor": "`ABB Asea Brown Boveri Ltd`",
    "severity": {
        "rvss-score": "10.0",
        "rvss-vector": "RVSS:1.0/AV:RN/AC:L/PR:N/UI:N/Y:M/S:U/C:L/I:H/A:H/H:N",
        "severity-description": "Critical",
        "cvss-score": 9.4,
        "cvss-vector": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:H/A:H/"
    },
    "links": [
                "https://nvd.nist.gov/vuln/detail/CVE-2017-9664"
    ],
    "flaw": {
        "phase": "testing",
        "specificity": "Runtime-operation",
        "architectural-location": "Platform Code",
        "application": "N/A",
        "subsystem": "N/A",
        "package": "N/A",
        "languages": "None",
        "date-detected": "2017-06-14",
        "detected-by": "Bertin Jose, Ezequiel Fernandez",
        "detected-by-method": "testing_dynamic",
        "date-reported": "2018-08-07",
        "reported-by": "Alias Robotics",
        "reported-by-relationship": "Security Researcher",
        "issue": "https://github.com/aliasrobotics/RVD/issues/10",
        "reproducibility": "Always",
        "trace": "N/A",
        "reproduction": "N/A",
        "reproduction-image": "N/A"
    },
    "exploitation": {
        "description": "N/A",
        "exploitation-image": "N/A",
        "exploitation-vector": "N/A"
    },
    "mitigation": {
        "description": "Products are based on a legacy software platform which is no longer actively maintained. The problem is corrected by installing a patch that is available at the following location",
        "pull-request": "http://search-ext.abb.com/library/Download.aspx?DocumentID=9AKK107045A1782&LanguageCode=en&DocumentPartId=&Action=Launch",
        "date-mitigation": null,
    }
}

aliasbot avatar Aug 07 '18 15:08 aliasbot

Feedback (automatically generated):

  • FIXME: Flaw not identified as a vulnerability, weakness or exposure. Have you included # Vulnerability (or Weakness or Exposure) report at the top of the ticket?, see Vulnerability report template for more information or review other tickets to get inspiration

Please review the feedback above. Once addressed, either request the removal of the malformed label to trigger another automatic review.

github-actions[bot] avatar Oct 27 '19 17:10 github-actions[bot]

Review dates in this ticket. Used the following sources:

  • https://www.us-cert.gov/ics/advisories/ICSA-17-222-05 (mitigation)
  • https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9664 (report, detection)

Note: NVD published much, much later.

vmayoral avatar Dec 08 '19 11:12 vmayoral

Ticket Updated. Requesting peer review.

glerapic avatar May 20 '20 08:05 glerapic