ID

VAR-200505-1053


CVE

CVE-2005-1002


TITLE

Logics Software LOG-FT Remote File Leak Vulnerability

Trust: 0.6

sources: CNVD: CNVD-2005-1788

DESCRIPTION

logwebftbs2000.exe in Logics Software File Transfer (LOG-FT) allows remote attackers to read arbitrary files via modified (1) VAR_FT_LANG and (2) VAR_FT_TMPL parameters. Logics Software LOG-FT is the corresponding component of Siemens BS2000 mainframe PC. It is used to manage the transmission and processing of files.  There is an input verification vulnerability in LOG-FT processing user requests. Remote attackers may use this vulnerability to gain unauthorized access to system files.  LOG-FT's logwebftbs2000.exe program does not properly check and filter user parameters in HTTP GET requests. LOG-FT is reported prone to an arbitrary file disclosure vulnerability. It is reported that an attacker can simply issue a specially crafted HTTP GET request to disclose sensitive files in the context of the affected Web server. Information disclosed through this attack may expose sensitive data that may be used to carry out further attacks against a computer. It is not confirmed whether this issue may also allow an attacker to upload arbitrary files. Example: http://[host]/logwebcgi/logwebftbs2000.exe?VAR_FT_LANG=c:\&VAR_FT_TMPL=[file] SOLUTION: Restrict access to the "logwebcgi" directory. This may affect functionality. PROVIDED AND/OR DISCOVERED BY: Pedro Vi\xf1uales and Rom\xe1n Ram\xedrez ---------------------------------------------------------------------- About: This Advisory was delivered by Secunia as a free service to help everybody keeping their systems up to date against the latest vulnerabilities. Subscribe: http://secunia.com/secunia_security_advisories/ Definitions: (Criticality, Where etc.) http://secunia.com/about_secunia_advisories/ Please Note: Secunia recommends that you verify all advisories you receive by clicking the link. Secunia NEVER sends attached files with advisories. Secunia does not advise people to install third party patches, only use those supplied by the vendor. ---------------------------------------------------------------------- Unsubscribe: Secunia Security Advisories http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org ----------------------------------------------------------------------

Trust: 1.8

sources: NVD: CVE-2005-1002 // CNVD: CNVD-2005-1788 // BID: 12998 // PACKETSTORM: 36991

IOT TAXONOMY

category:['ICS']sub_category: -

Trust: 0.6

sources: CNVD: CNVD-2005-1788

AFFECTED PRODUCTS

vendor:logicsmodel:log-ftscope:eqversion:*

Trust: 1.0

vendor:nonemodel: - scope: - version: -

Trust: 0.6

vendor:logicsmodel:log-ftscope: - version: -

Trust: 0.6

vendor:logicsmodel:software log-ftscope: - version: -

Trust: 0.3

sources: CNVD: CNVD-2005-1788 // BID: 12998 // CNNVD: CNNVD-200505-656 // NVD: CVE-2005-1002

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2005-1002
value: MEDIUM

Trust: 1.0

CNNVD: CNNVD-200505-656
value: MEDIUM

Trust: 0.6

nvd@nist.gov: CVE-2005-1002
severity: MEDIUM
baseScore: 5.0
vectorString: AV:N/AC:L/AU:N/C:P/I:N/A:N
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: NONE
availabilityImpact: NONE
exploitabilityScore: 10.0
impactScore: 2.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.0

sources: CNNVD: CNNVD-200505-656 // NVD: CVE-2005-1002

PROBLEMTYPE DATA

problemtype:NVD-CWE-Other

Trust: 1.0

sources: NVD: CVE-2005-1002

THREAT TYPE

remote

Trust: 0.6

sources: CNNVD: CNNVD-200505-656

TYPE

access verification error

Trust: 0.6

sources: CNNVD: CNNVD-200505-656

EXTERNAL IDS

db:NVDid:CVE-2005-1002

Trust: 2.5

db:BIDid:12998

Trust: 1.9

db:SECUNIAid:14851

Trust: 1.7

db:CNVDid:CNVD-2005-1788

Trust: 0.6

db:BUGTRAQid:20050405 LOGICS SOFTWARE BS2000 HOST TO WEB CLIENT ALL PLATFORMS

Trust: 0.6

db:CNNVDid:CNNVD-200505-656

Trust: 0.6

db:PACKETSTORMid:36991

Trust: 0.1

sources: CNVD: CNVD-2005-1788 // BID: 12998 // PACKETSTORM: 36991 // CNNVD: CNNVD-200505-656 // NVD: CVE-2005-1002

REFERENCES

url:http://www.securityfocus.com/bid/12998

Trust: 1.6

url:http://secunia.com/advisories/14851

Trust: 1.6

url:http://marc.info/?l=bugtraq&m=111271950916436&w=2

Trust: 1.0

url:http://marc.theaimsgroup.com/?l=bugtraq&m=111271950916436&w=2

Trust: 0.6

url:http://www.logicssoftware.com/products/bs2000/ft.htm

Trust: 0.3

url:/archive/1/394969

Trust: 0.3

url:http://secunia.com/secunia_security_advisories/

Trust: 0.1

url:http://secunia.com/advisories/14851/

Trust: 0.1

url:http://secunia.com/product/4890/

Trust: 0.1

url:http://secunia.com/secunia_vacancies/

Trust: 0.1

url:http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org

Trust: 0.1

url:http://[host]/logwebcgi/logwebftbs2000.exe?var_ft_lang=c:\&var_ft_tmpl=[file]

Trust: 0.1

url:http://secunia.com/about_secunia_advisories/

Trust: 0.1

sources: BID: 12998 // PACKETSTORM: 36991 // CNNVD: CNNVD-200505-656 // NVD: CVE-2005-1002

CREDITS

Discovery is credited to Pedro Viuales and Rom Ramirez.

Trust: 0.3

sources: BID: 12998

SOURCES

db:CNVDid:CNVD-2005-1788
db:BIDid:12998
db:PACKETSTORMid:36991
db:CNNVDid:CNNVD-200505-656
db:NVDid:CVE-2005-1002

LAST UPDATE DATE

2024-08-14T14:35:48.553000+00:00


SOURCES UPDATE DATE

db:CNVDid:CNVD-2005-1788date:2005-05-05T00:00:00
db:BIDid:12998date:2009-07-12T11:56:00
db:CNNVDid:CNNVD-200505-656date:2005-10-20T00:00:00
db:NVDid:CVE-2005-1002date:2016-10-18T03:16:25.287

SOURCES RELEASE DATE

db:CNVDid:CNVD-2005-1788date:2005-05-05T00:00:00
db:BIDid:12998date:2005-04-05T00:00:00
db:PACKETSTORMid:36991date:2005-04-17T07:21:25
db:CNNVDid:CNNVD-200505-656date:2005-05-02T00:00:00
db:NVDid:CVE-2005-1002date:2005-05-02T04:00:00