ID

VAR-201207-0104


CVE

CVE-2012-4027


TITLE

Tridium Niagara AX Framework Directory Traversal Vulnerability

Trust: 1.4

sources: IVD: ac874866-2353-11e6-abef-000c29c66e3d // CNVD: CNVD-2012-8527 // CNNVD: CNNVD-201207-223

DESCRIPTION

Directory traversal vulnerability in Tridium Niagara AX Framework allows remote attackers to read files outside of the intended images, nav, and px folders by leveraging incorrect permissions, as demonstrated by reading the config.bog file. The Niagara Framework is a unified, open, distributed platform that integrates the management of a wide variety of devices and systems. The Niagara Framework has an input validation vulnerability that allows an attacker to exploit a vulnerability for a directory traversal attack. The vulnerability is due to the fact that some of the unspecified input is missing validation before being used to read the file, and any file content can be obtained by submitting a malicious request. TRIDIUM NiagaraAX is prone to a directory-traversal vulnerability. Remote attackers can use specially crafted requests with directory-traversal sequences ('../') to retrieve arbitrary files in the context of the application. Exploiting this issue may allow an attacker to obtain sensitive information that could aid in further attacks. ---------------------------------------------------------------------- We are millions! Join us to protect all Pc's Worldwide. Download the new Secunia PSI 3.0 available in 5 languages and share it with your friends: http://secunia.com/psi ---------------------------------------------------------------------- TITLE: Niagara Framework Directory Traversal Vulnerability SECUNIA ADVISORY ID: SA49903 VERIFY ADVISORY: Secunia.com http://secunia.com/advisories/49903/ Customer Area (Credentials Required) https://ca.secunia.com/?page=viewadvisory&vuln_id=49903 RELEASE DATE: 2012-07-16 DISCUSS ADVISORY: http://secunia.com/advisories/49903/#comments AVAILABLE ON SITE AND IN CUSTOMER AREA: * Last Update * Popularity * Comments * Criticality Level * Impact * Where * Solution Status * Operating System / Software * CVE Reference(s) http://secunia.com/advisories/49903/ ONLY AVAILABLE IN CUSTOMER AREA: * Authentication Level * Report Reliability * Secunia PoC * Secunia Analysis * Systems Affected * Approve Distribution * Remediation Status * Secunia CVSS Score * CVSS https://ca.secunia.com/?page=viewadvisory&vuln_id=49903 ONLY AVAILABLE WITH SECUNIA CSI AND SECUNIA PSI: * AUTOMATED SCANNING http://secunia.com/vulnerability_scanning/personal/ http://secunia.com/vulnerability_scanning/corporate/wsus_sccm_3rd_third_party_patching/ DESCRIPTION: A vulnerability has been reported in Niagara Framework, which can be exploited by malicious people to disclose system information. This can be exploited to disclose the contents of arbitrary files via directory traversal sequences. SOLUTION: The vendor recommends to limit access to the affected systems. PROVIDED AND/OR DISCOVERED BY: The vendor credits Billy Rios and Terry McCorkle via ICS-CERT. ORIGINAL ADVISORY: https://www.tridium.com/galleries/briefings/NiagaraAX_Framework_Software_Security_Alert.pdf OTHER REFERENCES: Further details available in Customer Area: http://secunia.com/vulnerability_intelligence/ DEEP LINKS: Further details available in Customer Area: http://secunia.com/vulnerability_intelligence/ EXTENDED DESCRIPTION: Further details available in Customer Area: http://secunia.com/vulnerability_intelligence/ EXTENDED SOLUTION: Further details available in Customer Area: http://secunia.com/vulnerability_intelligence/ EXPLOIT: Further details available in Customer Area: http://secunia.com/vulnerability_intelligence/ ---------------------------------------------------------------------- About: This Advisory was delivered by Secunia as a free service to help private users keeping their systems up to date against the latest vulnerabilities. Subscribe: http://secunia.com/advisories/secunia_security_advisories/ Definitions: (Criticality, Where etc.) http://secunia.com/advisories/about_secunia_advisories/ Please Note: Secunia recommends that you verify all advisories you receive by clicking the link. Secunia NEVER sends attached files with advisories. Secunia does not advise people to install third party patches, only use those supplied by the vendor. ---------------------------------------------------------------------- Unsubscribe: Secunia Security Advisories http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org ----------------------------------------------------------------------

Trust: 3.51

sources: NVD: CVE-2012-4027 // JVNDB: JVNDB-2012-003104 // CNVD: CNVD-2012-8527 // CNVD: CNVD-2012-3707 // BID: 54454 // IVD: ac874866-2353-11e6-abef-000c29c66e3d // IVD: f999f736-1f5f-11e6-abef-000c29c66e3d // VULHUB: VHN-57308 // PACKETSTORM: 114789

IOT TAXONOMY

category:['ICS']sub_category: -

Trust: 1.6

sources: IVD: ac874866-2353-11e6-abef-000c29c66e3d // IVD: f999f736-1f5f-11e6-abef-000c29c66e3d // CNVD: CNVD-2012-8527 // CNVD: CNVD-2012-3707

AFFECTED PRODUCTS

vendor:tridiummodel:niagara axscope:eqversion:*

Trust: 1.0

vendor:tridiummodel:niagara ax frameworkscope: - version: -

Trust: 0.8

vendor:nomodel: - scope: - version: -

Trust: 0.6

vendor:tridiummodel:niagara frameworkscope: - version: -

Trust: 0.6

vendor:tridiummodel:niagra ax frameworkscope: - version: -

Trust: 0.6

vendor:niagra ax frameworkmodel: - scope:eqversion:*

Trust: 0.4

sources: IVD: ac874866-2353-11e6-abef-000c29c66e3d // IVD: f999f736-1f5f-11e6-abef-000c29c66e3d // CNVD: CNVD-2012-8527 // CNVD: CNVD-2012-3707 // JVNDB: JVNDB-2012-003104 // CNNVD: CNNVD-201207-223 // NVD: CVE-2012-4027

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2012-4027
value: MEDIUM

Trust: 1.0

NVD: CVE-2012-4027
value: MEDIUM

Trust: 0.8

CNVD: CNVD-2012-8527
value: HIGH

Trust: 0.6

CNNVD: CNNVD-201207-223
value: MEDIUM

Trust: 0.6

IVD: ac874866-2353-11e6-abef-000c29c66e3d
value: MEDIUM

Trust: 0.2

IVD: f999f736-1f5f-11e6-abef-000c29c66e3d
value: MEDIUM

Trust: 0.2

VULHUB: VHN-57308
value: MEDIUM

Trust: 0.1

nvd@nist.gov: CVE-2012-4027
severity: MEDIUM
baseScore: 5.0
vectorString: AV:N/AC:L/AU:N/C:P/I:N/A:N
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: NONE
availabilityImpact: NONE
exploitabilityScore: 10.0
impactScore: 2.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.8

CNVD: CNVD-2012-8527
severity: HIGH
baseScore: 7.8
vectorString: AV:N/AC:L/AU:N/C:C/I:N/A:N
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: COMPLETE
integrityImpact: NONE
availabilityImpact: NONE
exploitabilityScore: 10.0
impactScore: 6.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.6

IVD: ac874866-2353-11e6-abef-000c29c66e3d
severity: HIGH
baseScore: 7.8
vectorString: AV:N/AC:L/AU:N/C:C/I:N/A:N
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: COMPLETE
integrityImpact: NONE
availabilityImpact: NONE
exploitabilityScore: 10.0
impactScore: 6.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.9 [IVD]

Trust: 0.2

IVD: f999f736-1f5f-11e6-abef-000c29c66e3d
severity: MEDIUM
baseScore: 5.0
vectorString: AV:N/AC:L/AU:N/C:P/I:N/A:N
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: NONE
availabilityImpact: NONE
exploitabilityScore: 10.0
impactScore: 2.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.9 [IVD]

Trust: 0.2

VULHUB: VHN-57308
severity: MEDIUM
baseScore: 5.0
vectorString: AV:N/AC:L/AU:N/C:P/I:N/A:N
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: NONE
availabilityImpact: NONE
exploitabilityScore: 10.0
impactScore: 2.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.1

sources: IVD: ac874866-2353-11e6-abef-000c29c66e3d // IVD: f999f736-1f5f-11e6-abef-000c29c66e3d // CNVD: CNVD-2012-8527 // VULHUB: VHN-57308 // JVNDB: JVNDB-2012-003104 // CNNVD: CNNVD-201207-223 // NVD: CVE-2012-4027

PROBLEMTYPE DATA

problemtype:CWE-22

Trust: 1.0

problemtype:CWE-264

Trust: 0.9

sources: VULHUB: VHN-57308 // JVNDB: JVNDB-2012-003104 // NVD: CVE-2012-4027

THREAT TYPE

remote

Trust: 1.2

sources: CNNVD: CNNVD-201207-241 // CNNVD: CNNVD-201207-223

TYPE

path traversal

Trust: 1.2

sources: CNNVD: CNNVD-201207-241 // CNNVD: CNNVD-201207-223

CONFIGURATIONS

sources: JVNDB: JVNDB-2012-003104

PATCH

title:Security Alert: Niagara AX(tm) Directory Traversal Remediationurl:https://www.tridium.com/galleries/briefings/NiagaraAX_Framework_Software_Security_Alert.pdf

Trust: 0.8

sources: JVNDB: JVNDB-2012-003104

EXTERNAL IDS

db:NVDid:CVE-2012-4027

Trust: 3.9

db:BIDid:54454

Trust: 1.6

db:CNNVDid:CNNVD-201207-223

Trust: 1.1

db:CNVDid:CNVD-2012-8527

Trust: 0.8

db:CNVDid:CNVD-2012-3707

Trust: 0.8

db:JVNDBid:JVNDB-2012-003104

Trust: 0.8

db:SECUNIAid:49903

Trust: 0.7

db:CNNVDid:CNNVD-201207-241

Trust: 0.6

db:IVDid:AC874866-2353-11E6-ABEF-000C29C66E3D

Trust: 0.2

db:IVDid:F999F736-1F5F-11E6-ABEF-000C29C66E3D

Trust: 0.2

db:PACKETSTORMid:115639

Trust: 0.2

db:VULHUBid:VHN-57308

Trust: 0.1

db:PACKETSTORMid:114789

Trust: 0.1

sources: IVD: ac874866-2353-11e6-abef-000c29c66e3d // IVD: f999f736-1f5f-11e6-abef-000c29c66e3d // CNVD: CNVD-2012-8527 // CNVD: CNVD-2012-3707 // VULHUB: VHN-57308 // BID: 54454 // JVNDB: JVNDB-2012-003104 // PACKETSTORM: 114789 // PACKETSTORM: 115639 // CNNVD: CNNVD-201207-241 // CNNVD: CNNVD-201207-223 // NVD: CVE-2012-4027

REFERENCES

url:https://www.tridium.com/galleries/briefings/niagaraax_framework_software_security_alert.pdf

Trust: 1.8

url:http://www.washingtonpost.com/investigations/tridiums-niagara-framework-marvel-of-connectivity-illustrates-new-cyber-risks/2012/07/11/gjqarjl6dw_story.html

Trust: 1.7

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2012-4027

Trust: 0.8

url:http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2012-4027

Trust: 0.8

url:http://web.nvd.nist.gov/view/vuln/search-results?query=cve-2012-4027

Trust: 0.6

url:http://secunia.com/advisories/49903/https

Trust: 0.6

url:http://www.securityfocus.com/bid/54454

Trust: 0.6

url:https://ca.secunia.com/?page=viewadvisory&vuln_id=49903

Trust: 0.1

url:http://secunia.com/psi

Trust: 0.1

url:http://secunia.com/vulnerability_intelligence/

Trust: 0.1

url:http://secunia.com/advisories/secunia_security_advisories/

Trust: 0.1

url:http://secunia.com/vulnerability_scanning/corporate/wsus_sccm_3rd_third_party_patching/

Trust: 0.1

url:http://secunia.com/advisories/49903/#comments

Trust: 0.1

url:http://secunia.com/vulnerability_scanning/personal/

Trust: 0.1

url:http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org

Trust: 0.1

url:http://secunia.com/advisories/49903/

Trust: 0.1

url:http://secunia.com/advisories/about_secunia_advisories/

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2012-4028

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2012-3025

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2012-3024

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2012-4027

Trust: 0.1

sources: CNVD: CNVD-2012-8527 // CNVD: CNVD-2012-3707 // VULHUB: VHN-57308 // JVNDB: JVNDB-2012-003104 // PACKETSTORM: 114789 // PACKETSTORM: 115639 // CNNVD: CNNVD-201207-241 // CNNVD: CNNVD-201207-223 // NVD: CVE-2012-4027

CREDITS

Billy Rios and Terry McCorkle

Trust: 0.9

sources: BID: 54454 // CNNVD: CNNVD-201207-241

SOURCES

db:IVDid:ac874866-2353-11e6-abef-000c29c66e3d
db:IVDid:f999f736-1f5f-11e6-abef-000c29c66e3d
db:CNVDid:CNVD-2012-8527
db:CNVDid:CNVD-2012-3707
db:VULHUBid:VHN-57308
db:BIDid:54454
db:JVNDBid:JVNDB-2012-003104
db:PACKETSTORMid:114789
db:PACKETSTORMid:115639
db:CNNVDid:CNNVD-201207-241
db:CNNVDid:CNNVD-201207-223
db:NVDid:CVE-2012-4027

LAST UPDATE DATE

2024-11-23T22:35:27.322000+00:00


SOURCES UPDATE DATE

db:CNVDid:CNVD-2012-8527date:2012-07-17T00:00:00
db:CNVDid:CNVD-2012-3707date:2012-07-18T00:00:00
db:VULHUBid:VHN-57308date:2012-07-17T00:00:00
db:BIDid:54454date:2013-08-13T07:26:00
db:JVNDBid:JVNDB-2012-003104date:2012-07-18T00:00:00
db:CNNVDid:CNNVD-201207-241date:2012-07-18T00:00:00
db:CNNVDid:CNNVD-201207-223date:2023-03-23T00:00:00
db:NVDid:CVE-2012-4027date:2024-11-21T01:42:04.297

SOURCES RELEASE DATE

db:IVDid:ac874866-2353-11e6-abef-000c29c66e3ddate:2012-07-17T00:00:00
db:IVDid:f999f736-1f5f-11e6-abef-000c29c66e3ddate:2012-07-18T00:00:00
db:CNVDid:CNVD-2012-8527date:2012-07-17T00:00:00
db:CNVDid:CNVD-2012-3707date:2012-07-18T00:00:00
db:VULHUBid:VHN-57308date:2012-07-16T00:00:00
db:BIDid:54454date:2012-07-13T00:00:00
db:JVNDBid:JVNDB-2012-003104date:2012-07-18T00:00:00
db:PACKETSTORMid:114789date:2012-07-17T01:30:18
db:PACKETSTORMid:115639date:2012-08-17T03:33:48
db:CNNVDid:CNNVD-201207-241date:2012-07-18T00:00:00
db:CNNVDid:CNNVD-201207-223date:2012-07-17T00:00:00
db:NVDid:CVE-2012-4027date:2012-07-16T20:55:04.957