Vulnerability Summary for the Week of June 17, 2019
Total Page:16
File Type:pdf, Size:1020Kb
Vulnerability Summary for the Week of June 17, 2019 The vulnerabilities are based on the CVE vulnerability naming standard and are organized according to severity, determined by the Common Vulnerability Scoring System (CVSS) standard. The division of high, medium, and low severities correspond to the following scores: • High - Vulnerabilities will be labeled High severity if they have a CVSS base score of 7.0 - 10.0 • Medium - Vulnerabilities will be labeled Medium severity if they have a CVSS base score of 4.0 - 6.9 • Low - Vulnerabilities will be labeled Low severity if they have a CVSS base score of 0.0 - 3.9 Entries may include additional information provided by organizations and efforts sponsored by Ug-CERT. This information may include identifying information, values, definitions, and related links. Patch information is provided when available. Please note that some of the information in the bulletins is compiled from external, open source reports and is not a direct result of Ug- CERT analysis. High Vulnerabilities C VS Sour Publ Primary S ce & Description ishe Vendor -- Product Sc Patch d or Info e An issue was discovered on Actiontec T2200H T2200H- 31.128L.08 devices, as distributed by Telus. By attaching a UART adapter to the CVE- UART pins on the system board, 2019- an attacker can use a special key 2019 actiontec -- 1278 sequence (Ctrl-\) to obtain a shell -06- 7.2 t2200h_firmware 9 with root privileges. After 17 MISC gaining root access, the attacker MISC can mount the filesystem read- write and make permanent modifications to the device including bricking of the device, disabling vendor management of C VS Sour Publ Primary S ce & Description ishe Vendor -- Product Sc Patch d or Info e the device, preventing automatic upgrades, and permanently installing malicious code on the device. Stack-based buffer overflow in Advantech WebAccess/SCADA CVE- 8.4.0 allows a remote, 2019 2019- advantech -- webaccess unauthenticated attacker to -06- 7.5 3953 execute arbitrary code by 18 MISC sending a crafted IOCTL 10012 RPC call. Stack-based buffer overflow in Advantech WebAccess/SCADA CVE- 8.4.0 allows a remote, 2019 2019- advantech -- webaccess unauthenticated attacker to -06- 7.5 3954 execute arbitrary code by 18 MISC sending a crafted IOCTL 81024 RPC call. CVE- SQL Injection exists in the 2018- 2019 AMGallery 1.2.3 component for 1739 arenam -- amgallery -06- 7.5 Joomla! via the 8 19 filter_category_id parameter. MISC MISC In BubbleUPnP 0.9 update 30, CVE- the XML parsing engine for 2018- 2019 bubblesoftapps -- SSDP/UPnP functionality is 1550 -06- 7.5 bubbleupnp vulnerable to an XML External 6 19 Entity Processing (XXE) attack. CON Remote, unauthenticated FIRM C VS Sour Publ Primary S ce & Description ishe Vendor -- Product Sc Patch d or Info e attackers can use this vulnerability to: (1) Access arbitrary files from the filesystem with the same permission as the user account running BubbleUPnP, (2) Initiate SMB connections to capture a NetNTLM challenge/response and crack the cleartext password, or (3) Initiate SMB connections to relay a NetNTLM challenge/response and achieve Remote Command Execution in Windows domains. CVE- BZ2_decompress in 2019 2019- decompress.c in bzip2 through bzip -- bzip2 -06- 7.5 1290 1.0.6 has an out-of-bounds write 19 0 when there are many selectors. MISC SQL injection vulnerability in CVE- ChronoScan version 1.5.4.3 and 2018- 2019 earlier allows an unauthenticated 1586 chronoscan -- chronoscan -06- 7.5 attacker to execute arbitrary SQL 8 21 commands via the MISC wcr_machineid cookie. MISC A vulnerability in the CLI CVE- configuration shell of Cisco 2019- Meeting Server could allow an 2019 1623 cisco -- meeting_server authenticated, local attacker to -06- 7.2 BID inject arbitrary commands as the 19 CISC root user. The vulnerability is O due to insufficient input C VS Sour Publ Primary S ce & Description ishe Vendor -- Product Sc Patch d or Info e validation during the execution of a vulnerable CLI command. An attacker with administrator- level credentials could exploit this vulnerability by injecting crafted arguments during command execution. A successful exploit could allow the attacker to perform arbitrary code execution as root on an affected product. In firmware version MS_2.6.9900 of Columbia CVE- Weather MicroServer, the 2018- columbiaweather -- BACnet daemon does not 2019 1887 weather_microserver_fir properly validate input, which -06- 7.8 8 mware could allow a remote attacker to 18 MISC send specially crafted packets MISC causing the device to become unavailable. Delta Electronics DeviceNet CVE- Builder 2.04 has a User Mode 2019 2019- deltaww -- Write AV starting at -06- 7.5 1289 devicenet_builder image00400000+0x0000000000 19 8 17a45e. MISC Delta Electronics DeviceNet CVE- Builder 2.04 has a User Mode 2019 2019- deltaww -- Write AV starting at -06- 7.5 1289 devicenet_builder ntdll!RtlQueueWorkItem+0x000 19 9 00000000005e3. MISC C VS Sour Publ Primary S ce & Description ishe Vendor -- Product Sc Patch d or Info e CVE- SQL injection exists in Scriptzee 2018- 2019 education_website_proje Education Website 1.0 via the 1784 -06- 7.5 ct -- education_website college_list.html subject, city, or 0 19 country parameter. MISC MISC An issue was discovered in EthereumJ 1.8.2. There is Unsafe CVE- Deserialization in ois.readObject 2018- in mine/Ethash.java and 2019 1589 10. ethereum -- ethereumj decoder.readObject in -06- 0 0 crypto/ECKey.java. When a 20 MISC node syncs and mines a new MISC block, arbitrary OS commands MISC can be run on the server. CVE- Jonathan Looney discovered that 2019- the TCP_SKB_CB(skb)- 1147 >tcp_gso_segs value was subject 7 to an integer overflow in the MISC Linux kernel when handling MLIS TCP Selective T f5 -- big- Acknowledgments (SACKs). A 2019 MISC ip_access_policy_manag remote attacker could use this to -06- 7.8 MISC er cause a denial of service. This 18 MISC has been fixed in stable kernel CON releases 4.4.182, 4.9.182, FIRM 4.14.127, 4.19.52, 5.1.11, and is CON fixed in commit FIRM 3b4929f65b0d8249f19a50245cd MISC 88ed1a2f78cff. CER T-VN C VS Sour Publ Primary S ce & Description ishe Vendor -- Product Sc Patch d or Info e CVE- flippa_marketplace_clon SQL injection exists in Scriptzee 2018- 2019 e_project -- Flippa Marketplace Clone 1.0 1784 -06- 7.5 flippa_marketplace_clon via the site-search sortBy or 1 19 e sortDir parameter. MISC MISC app/backup/index.php in the Backup Module in FusionPBX CVE- 4.4.3 suffers from a command 2019- 2019 injection vulnerability due to a 1141 fusionpbx -- fusionpbx -06- 9.0 lack of input validation, which 0 17 allows authenticated MISC administrative attackers to MISC execute commands on the host. An issue was discovered on Vera VeraEdge 1.7.19 and Veralite 1.7.481 devices. The device provides a web user interface that allows a user to manage the device. As a part of the functionality the device firmware CVE- file contains a file known as 2017- relay.sh which allows the device 9384 2019 getvera -- to create relay ports and connect MISC -06- 9.0 veraedge_firmware the device to Vera servers. This MISC 17 is primarily used as a method of BUG communication between the TRA device and Vera servers so the Q devices can be communicated with even when the user is not at home. One of the parameters retrieved by this specific script is "remote_host". This parameter is not sanitized by the script C VS Sour Publ Primary S ce & Description ishe Vendor -- Product Sc Patch d or Info e correctly and is passed in a call to "eval" to execute another script where remote_host is concatenated to be passed a parameter to the second script. This allows an attacker to escape from the executed command and then execute any commands of his/her choice. An issue was discovered on Vera VeraEdge 1.7.19 and Veralite 1.7.481 devices. The device provides a web user interface that allows a user to manage the device. As a part of the functionality the device firmware file contains a file known as proxy.sh which allows the device to proxy a specific request to and CVE- from from another website. This 2017- is primarily used as a method of 9388 2019 getvera -- communication between the MISC -06- 9.0 veraedge_firmware device and Vera website when MISC 17 the user is logged in to the BUG https://home.getvera.com and TRA allows the device to Q communicate between the device and website. One of the parameters retrieved by this specific script is "url". This parameter is not sanitized by the script correctly and is passed in a call to "eval" to execute "curl" functionality. This allows an attacker to escape from the C VS Sour Publ Primary S ce & Description ishe Vendor -- Product Sc Patch d or Info e executed command and then execute any commands of his/her choice. An issue was discovered on Vera VeraEdge 1.7.19 and Veralite 1.7.481 devices. The device provides a web user interface that allows a user to manage the device. As a part of the functionality the device allows a user to install applications written in the Lua programming language. Also the interface allows any user to write his/her application in the Lua language. However, this functionality is CVE- not protected by authentication 2017- and this allows an attacker to run 9389 2019 getvera -- arbitrary Lua code on the device. MISC -06- 9.0 veraedge_firmware The POST request is forwarded MISC 17 to LuaUPNP daemon on the BUG device. This binary handles the TRA received Lua code in the Q function "LU::JobHandler_LuaUPnP::Ru nLua(LU::JobHandler_LuaUPnP *__hidden this, LU::UPnPActionWrapper *)".