ID

VAR-201401-0364


CVE

CVE-2014-0750


TITLE

GE Intelligent Platforms Proficy HMI/SCADA - CIMPLICITY and Proficy Process Systems with CIMPLICITY Vulnerable to directory traversal

Trust: 0.8

sources: JVNDB: JVNDB-2014-001257

DESCRIPTION

Directory traversal vulnerability in gefebt.exe in the WebView CimWeb components in GE Intelligent Platforms Proficy HMI/SCADA - CIMPLICITY through 8.2 SIM 24, and Proficy Process Systems with CIMPLICITY, allows remote attackers to execute arbitrary code via a crafted HTTP request, aka ZDI-CAN-1622. Zero Day Initiative Is vulnerable to this vulnerability ZDI-CAN-1622 Was numbered.Skillfully crafted by a third party HTTP Arbitrary code may be executed via a request. Authentication is not required to exploit this vulnerability. The specific flaw exists within the gefebt.exe component. This component performs insufficient parameter validation on an HTTP request. Successful exploitation will allow an attacker to upload and execute an arbitrary file on the target server. GE Proficy CIMPLICITY is a monitoring software developed by GE and one of the industry's leading HMI/SCADA software. GE Proficy CIMPLICITY CimWebServer The gefebt.exe component fails to properly check the location of shell files loaded into the system. By modifying the source location, an attacker can send shell code to CimWebServer and deploy it in a server-side script to execute arbitrary code. The following products are affected: Proficy HMI/SCADA - CIMPLICITY 4.01 through versions 8.2 Proficy Process Systems with CIMPLICITY

Trust: 3.24

sources: NVD: CVE-2014-0750 // JVNDB: JVNDB-2014-001257 // ZDI: ZDI-14-015 // CNVD: CNVD-2014-00669 // BID: 65124 // IVD: 4371f0a2-2352-11e6-abef-000c29c66e3d

IOT TAXONOMY

category:['ICS']sub_category: -

Trust: 0.8

sources: IVD: 4371f0a2-2352-11e6-abef-000c29c66e3d // CNVD: CNVD-2014-00669

AFFECTED PRODUCTS

vendor:gemodel:intelligent platforms proficy hmi\/scada cimplicityscope:eqversion:7.5

Trust: 1.6

vendor:gemodel:intelligent platforms proficy hmi\/scada cimplicityscope:eqversion:8.0

Trust: 1.6

vendor:gemodel:intelligent platforms proficy process systems with cimplicityscope:eqversion: -

Trust: 1.6

vendor:gemodel:intelligent platforms proficy hmi\/scada cimplicityscope:eqversion:4.01

Trust: 1.6

vendor:gemodel:intelligent platforms proficy hmi\/scada cimplicityscope:eqversion:8.2

Trust: 1.6

vendor:gemodel:intelligent platforms proficy hmi\/scada cimplicityscope:eqversion:8.1

Trust: 1.6

vendor:gemodel:intelligent platforms proficy hmi\%2fscada cimplicityscope:lteversion:8.2

Trust: 1.0

vendor:general electricmodel:proficy hmi/scada - cimplicityscope:eqversion:4.01 to 8.2

Trust: 0.8

vendor:general electricmodel:proficy process systems with cimplicityscope: - version: -

Trust: 0.8

vendor:gemodel:proficy cimplicityscope: - version: -

Trust: 0.7

vendor:generalmodel:electric proficy process systems with cimplicityscope: - version: -

Trust: 0.6

vendor:generalmodel:electric proficy hmi/scada \342\200\223 cimplicityscope:eqversion:4.01-8.2

Trust: 0.6

vendor:gemodel:intelligent platforms proficy hmi\%2fscada cimplicityscope:eqversion:8.2

Trust: 0.6

vendor:intelligent platforms proficy hmi 2fscada cimplicitymodel: - scope:eqversion:*

Trust: 0.2

vendor:intelligent platforms proficy hmi scada cimplicitymodel: - scope:eqversion:4.01

Trust: 0.2

vendor:intelligent platforms proficy hmi scada cimplicitymodel: - scope:eqversion:7.5

Trust: 0.2

vendor:intelligent platforms proficy hmi scada cimplicitymodel: - scope:eqversion:8.0

Trust: 0.2

vendor:intelligent platforms proficy hmi scada cimplicitymodel: - scope:eqversion:8.1

Trust: 0.2

vendor:intelligent platforms proficy hmi scada cimplicitymodel: - scope:eqversion:8.2

Trust: 0.2

vendor:intelligent platforms proficy process with cimplicitymodel: - scope:eqversion: -

Trust: 0.2

sources: IVD: 4371f0a2-2352-11e6-abef-000c29c66e3d // ZDI: ZDI-14-015 // CNVD: CNVD-2014-00669 // JVNDB: JVNDB-2014-001257 // CNNVD: CNNVD-201401-523 // NVD: CVE-2014-0750

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2014-0750
value: HIGH

Trust: 1.0

NVD: CVE-2014-0750
value: HIGH

Trust: 0.8

ZDI: CVE-2014-0750
value: HIGH

Trust: 0.7

CNVD: CNVD-2014-00669
value: HIGH

Trust: 0.6

CNNVD: CNNVD-201401-523
value: HIGH

Trust: 0.6

IVD: 4371f0a2-2352-11e6-abef-000c29c66e3d
value: HIGH

Trust: 0.2

nvd@nist.gov: CVE-2014-0750
severity: HIGH
baseScore: 7.5
vectorString: AV:N/AC:L/AU:N/C:P/I:P/A:P
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: PARTIAL
availabilityImpact: PARTIAL
exploitabilityScore: 10.0
impactScore: 6.4
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 2.5

CNVD: CNVD-2014-00669
severity: HIGH
baseScore: 7.5
vectorString: AV:N/AC:L/AU:N/C:P/I:P/A:P
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: PARTIAL
availabilityImpact: PARTIAL
exploitabilityScore: 10.0
impactScore: 6.4
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.6

IVD: 4371f0a2-2352-11e6-abef-000c29c66e3d
severity: HIGH
baseScore: 7.5
vectorString: AV:N/AC:L/AU:N/C:P/I:P/A:P
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: PARTIAL
availabilityImpact: PARTIAL
exploitabilityScore: 10.0
impactScore: 6.4
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.9 [IVD]

Trust: 0.2

sources: IVD: 4371f0a2-2352-11e6-abef-000c29c66e3d // ZDI: ZDI-14-015 // CNVD: CNVD-2014-00669 // JVNDB: JVNDB-2014-001257 // CNNVD: CNNVD-201401-523 // NVD: CVE-2014-0750

PROBLEMTYPE DATA

problemtype:CWE-22

Trust: 1.8

sources: JVNDB: JVNDB-2014-001257 // NVD: CVE-2014-0750

THREAT TYPE

remote

Trust: 0.6

sources: CNNVD: CNNVD-201401-523

TYPE

Path traversal

Trust: 0.8

sources: IVD: 4371f0a2-2352-11e6-abef-000c29c66e3d // CNNVD: CNNVD-201401-523

CONFIGURATIONS

sources: JVNDB: JVNDB-2014-001257

PATCH

title:KB15939url:http://support.ge-ip.com/support/index?page=kbchannel&id=KB15939

Trust: 0.8

title:GE has issued an update to correct this vulnerability.url:http://ics-cert.us-cert.gov/advisories/ICSA-14-023-01

Trust: 0.7

title:Patches for multiple Generel Electric products 'gefebt.exe' shell upload vulnerabilityurl:https://www.cnvd.org.cn/patchInfo/show/43195

Trust: 0.6

sources: ZDI: ZDI-14-015 // CNVD: CNVD-2014-00669 // JVNDB: JVNDB-2014-001257

EXTERNAL IDS

db:NVDid:CVE-2014-0750

Trust: 4.2

db:ICS CERTid:ICSA-14-023-01

Trust: 3.0

db:BIDid:65124

Trust: 1.9

db:CNVDid:CNVD-2014-00669

Trust: 0.8

db:CNNVDid:CNNVD-201401-523

Trust: 0.8

db:JVNDBid:JVNDB-2014-001257

Trust: 0.8

db:ZDI_CANid:ZDI-CAN-1622

Trust: 0.7

db:ZDIid:ZDI-14-015

Trust: 0.7

db:IVDid:4371F0A2-2352-11E6-ABEF-000C29C66E3D

Trust: 0.2

sources: IVD: 4371f0a2-2352-11e6-abef-000c29c66e3d // ZDI: ZDI-14-015 // CNVD: CNVD-2014-00669 // BID: 65124 // JVNDB: JVNDB-2014-001257 // CNNVD: CNNVD-201401-523 // NVD: CVE-2014-0750

REFERENCES

url:http://ics-cert.us-cert.gov/advisories/icsa-14-023-01

Trust: 3.7

url:http://support.ge-ip.com/support/index?page=kbchannel&id=kb15939

Trust: 1.6

url:http://www.securityfocus.com/bid/65124

Trust: 1.0

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2014-0750

Trust: 0.8

url:http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2014-0750

Trust: 0.8

sources: ZDI: ZDI-14-015 // CNVD: CNVD-2014-00669 // JVNDB: JVNDB-2014-001257 // CNNVD: CNNVD-201401-523 // NVD: CVE-2014-0750

CREDITS

ZombiE and amisto0x07

Trust: 0.7

sources: ZDI: ZDI-14-015

SOURCES

db:IVDid:4371f0a2-2352-11e6-abef-000c29c66e3d
db:ZDIid:ZDI-14-015
db:CNVDid:CNVD-2014-00669
db:BIDid:65124
db:JVNDBid:JVNDB-2014-001257
db:CNNVDid:CNNVD-201401-523
db:NVDid:CVE-2014-0750

LAST UPDATE DATE

2024-11-23T22:46:08.345000+00:00


SOURCES UPDATE DATE

db:ZDIid:ZDI-14-015date:2014-02-13T00:00:00
db:CNVDid:CNVD-2014-00669date:2014-01-28T00:00:00
db:BIDid:65124date:2015-07-15T00:14:00
db:JVNDBid:JVNDB-2014-001257date:2014-01-28T00:00:00
db:CNNVDid:CNNVD-201401-523date:2014-02-08T00:00:00
db:NVDid:CVE-2014-0750date:2024-11-21T02:02:44.483

SOURCES RELEASE DATE

db:IVDid:4371f0a2-2352-11e6-abef-000c29c66e3ddate:2014-01-28T00:00:00
db:ZDIid:ZDI-14-015date:2014-02-13T00:00:00
db:CNVDid:CNVD-2014-00669date:2014-01-28T00:00:00
db:BIDid:65124date:2014-01-23T00:00:00
db:JVNDBid:JVNDB-2014-001257date:2014-01-28T00:00:00
db:CNNVDid:CNNVD-201401-523date:2014-01-28T00:00:00
db:NVDid:CVE-2014-0750date:2014-01-25T22:55:04.550