Executive Summary



This Alert is flagged as TOP 25 Common Weakness Enumeration from CWE/SANS. For more information, you can read this.
Summary
Title Quantum Scalar i500, Dell ML6000 and IBM TS3310 tape libraries web interface and preconfigured password vulnerabilities
Informations
Name VU#913483 First vendor Publication 2012-03-19
Vendor VU-CERT Last vendor Modification 2012-04-13
Severity (Vendor) N/A Revision M

Security-Database Scoring CVSS v3

Cvss vector : N/A
Overall CVSS Score NA
Base Score NA Environmental Score NA
impact SubScore NA Temporal Score NA
Exploitabality Sub Score NA
 
Calculate full CVSS 3.0 Vectors scores

Security-Database Scoring CVSS v2

Cvss vector : (AV:N/AC:L/Au:N/C:P/I:P/A:P)
Cvss Base Score 7.5 Attack Range Network
Cvss Impact Score 6.4 Attack Complexity Low
Cvss Expoit Score 10 Authentication None Required
Calculate full CVSS 2.0 Vectors scores

Detail

Vulnerability Note VU#913483

Quantum Scalar i500, Dell ML6000 and IBM TS3310 tape libraries web interface and preconfigured password vulnerabilities

Original Release date: 19 Mar 2012 | Last revised: 13 Apr 2012

Overview

Cross scripting and preconfigured password vulnerabilities have been reported to exist in the Quantum Scalar i500, Dell ML6000 and IBM TS3310 tape libraries.

Description

Quantum Scalar i500, Dell ML6000 and IBM TS3310 enterprise tape libraries contain multiple web interface and preconfigured account password vulnerabilities.

The Quantum Scalar i500 and Dell ML6000 tape libraries contain the following web interface vulnerabilities.

  • CWE-552: Files or Directories Accessible to External Parties
    The web interface allows an unauthenticated remote user to view any file on the web server, for example http://device/logShow.htm?file=/etc/shadow (CVE-2012-1841).
  • CWE-200: Information Exposure
    A cross-site scripting vulnerability in http://device/checkQKMProg.htm allows compromise of active session ids (CVE-2012-1842).
  • CWE-352: Cross-Site Request Forgery (CSRF)
    A command-injection vulnerability in http://device/saveRestore.htm (via the fileName POST parameter) allows execution of arbitrary commands as the root user, by an authenticated remote web user (CVE-2012-1843).
  • CWE-259: Use of Hard-coded Password
    The Quantum Scalar i500, Dell ML6000 and IBM TS3310 tape libraries also contain preconfigured passwords for certain accounts which are considered to be weak and could be exploited allowing an attacker user access (CVE-2012-1844).

The CVSS metrics below apply to CVE-2012-1844.

Impact

An attacker with access to a local user account or via malicious URL can execute arbitrary code or commands on the vulnerable system. It has been reported to us that customer data residing on the tapes within the libraries are not affected.

Solution

Upgrade firmware

Quantum has released a firmware update i7.0.3 (604G.GS00100) or greater will correct these issues.

Dell firmware update A20-00 (590G.GS00100) or greater will correct these issues.

IBM firmware update R6C (606G.GS001) or greater will correct these issues.

Restrict access

As a general good security practice, only allow connections from trusted hosts and networks. Note that restricting access does not prevent XSS or CSRF attacks since the attack comes as an HTTP request from a legitimate user's host. Restricting access would prevent an attacker from accessing a Quantum Scalar i500, Dell ML6000 and IBM TS3310 tape libraries using stolen credentials from a blocked network location.

Vendor Information

VendorStatusDate NotifiedDate Updated
Dell Computer Corporation, Inc.Affected16 Nov 201113 Apr 2012
IBM CorporationAffected23 Nov 201113 Apr 2012
QuantumAffected23 Nov 201113 Apr 2012

CVSS Metrics (Learn More)

GroupScoreVector
Base6.8AV:N/AC:M/Au:N/C:P/I:P/A:P
Temporal5.3E:POC/RL:OF/RC:C
Environmental5.3CDP:ND/TD:ND/CR:ND/IR:ND/AR:ND

References

  • http://cwe.mitre.org/data/definitions/552.html
  • http://cwe.mitre.org/data/definitions/200.html
  • http://cwe.mitre.org/data/definitions/352.html
  • http://cwe.mitre.org/data/definitions/259.html
  • http://www.quantum.com/ServiceandSupport/SoftwareandDocumentationDownloads/SI500/Index.aspx
  • http://support.dell.com
  • http://www-933.ibm.com/support/fixcentral/

Credit

Thanks to NOAA CIRT for reporting this vulnerability.

This document was written by Michael Orlando.

Other Information

  • CVE IDs:CVE-2012-1844CVE-2012-1843CVE-2012-1842CVE-2012-1841
  • Date Public:19 Mar 2012
  • Date First Published:19 Mar 2012
  • Date Last Updated:13 Apr 2012
  • Document Revision:41

Feedback

If you have feedback, comments, or additional information about this vulnerability, please send us email.


This product is provided subject to the Notification as indicated here: http://www.us-cert.gov/legal.html#notify

Original Source

Url : http://www.kb.cert.org/vuls/id/913483

CWE : Common Weakness Enumeration

% Id Name
25 % CWE-352 Cross-Site Request Forgery (CSRF) (CWE/SANS Top 25)
25 % CWE-255 Credentials Management
25 % CWE-79 Failure to Preserve Web Page Structure ('Cross-site Scripting') (CWE/SANS Top 25)
25 % CWE-22 Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') (CWE/SANS Top 25)

CPE : Common Platform Enumeration

TypeDescriptionCount
Application 1
Application 1
Application 13
Hardware 2
Hardware 1
Hardware 1
Hardware 1
Hardware 2
Hardware 3

OpenVAS Exploits

Date Description
2012-04-11 Name : Multiple Vendor Products Security Vulnerabilities
File : nvt/gb_quantum_scalar_52566.nasl