ID

VAR-201404-0538


CVE

CVE-2014-0763


TITLE

Advantech WebAccess of DBVisitor.dll In SQL Injection vulnerability

Trust: 0.8

sources: JVNDB: JVNDB-2014-001974

DESCRIPTION

Multiple SQL injection vulnerabilities in DBVisitor.dll in Advantech WebAccess before 7.2 allow remote attackers to execute arbitrary SQL commands via SOAP requests to unspecified functions. Authentication is not required to exploit this vulnerability. The specific flaw exists within the DBVisitor.dll component. These flaws allow an attacker to execute arbitrary SQL statements in the context of the web service and to exfiltrate data (including the account names and password hashes) from the vulnerable product. Advantech WebAccess HMI/SCADA is an HMI/SCADA software. There is a SQL injection vulnerability in Advantech WebAccess. Because the SOAP interface exposes DBVisitor.dll, it allows an attacker to exploit a vulnerability to submit a specially crafted SOAP request, inject or manipulate a SQL query, and obtain sensitive sensitive information or manipulate the database. Advantech WebAccess is prone to an SQL-injection vulnerability because the application fails to properly sanitize user-supplied input before using it in an SQL query. A successful exploit could allow an attacker to compromise the application, to access or modify data, or to exploit vulnerabilities in the underlying database. Advantech WebAccess 7.1 and prior are vulnerable. The software supports dynamic graphic display and real-time data control, and provides functions of remote control and management of automation equipment

Trust: 3.51

sources: NVD: CVE-2014-0763 // JVNDB: JVNDB-2014-001974 // ZDI: ZDI-14-077 // CNVD: CNVD-2014-02243 // BID: 66740 // IVD: 0ad07d9e-1edf-11e6-abef-000c29c66e3d // IVD: 1654b8d4-2352-11e6-abef-000c29c66e3d // VULHUB: VHN-68256

IOT TAXONOMY

category:['ICS']sub_category: -

Trust: 1.0

sources: IVD: 0ad07d9e-1edf-11e6-abef-000c29c66e3d // IVD: 1654b8d4-2352-11e6-abef-000c29c66e3d // CNVD: CNVD-2014-02243

AFFECTED PRODUCTS

vendor:advantechmodel:webaccessscope:eqversion:5.0

Trust: 1.6

vendor:advantechmodel:webaccessscope:eqversion:7.0

Trust: 1.6

vendor:advantechmodel:webaccessscope:eqversion:6.0

Trust: 1.6

vendor:advantechmodel:webaccessscope:eqversion:7.1

Trust: 1.2

vendor:advantechmodel:webaccessscope:lteversion:7.1

Trust: 1.0

vendor:advantechmodel:webaccessscope:ltversion:7.2

Trust: 0.8

vendor:advantechmodel:webaccessscope: - version: -

Trust: 0.7

vendor:advantech webaccessmodel: - scope:eqversion:5.0

Trust: 0.4

vendor:advantech webaccessmodel: - scope:eqversion:6.0

Trust: 0.4

vendor:advantech webaccessmodel: - scope:eqversion:7.0

Trust: 0.4

vendor:advantech webaccessmodel: - scope:eqversion:*

Trust: 0.4

sources: IVD: 0ad07d9e-1edf-11e6-abef-000c29c66e3d // IVD: 1654b8d4-2352-11e6-abef-000c29c66e3d // ZDI: ZDI-14-077 // CNVD: CNVD-2014-02243 // JVNDB: JVNDB-2014-001974 // CNNVD: CNNVD-201404-169 // NVD: CVE-2014-0763

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2014-0763
value: HIGH

Trust: 1.0

NVD: CVE-2014-0763
value: HIGH

Trust: 0.8

ZDI: CVE-2014-0763
value: HIGH

Trust: 0.7

CNVD: CNVD-2014-02243
value: HIGH

Trust: 0.6

CNNVD: CNNVD-201404-169
value: HIGH

Trust: 0.6

IVD: 0ad07d9e-1edf-11e6-abef-000c29c66e3d
value: HIGH

Trust: 0.2

IVD: 1654b8d4-2352-11e6-abef-000c29c66e3d
value: HIGH

Trust: 0.2

VULHUB: VHN-68256
value: HIGH

Trust: 0.1

nvd@nist.gov: CVE-2014-0763
severity: HIGH
baseScore: 7.5
vectorString: AV:N/AC:L/AU:N/C:P/I:P/A:P
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: PARTIAL
availabilityImpact: PARTIAL
exploitabilityScore: 10.0
impactScore: 6.4
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 2.5

CNVD: CNVD-2014-02243
severity: HIGH
baseScore: 7.5
vectorString: AV:N/AC:L/AU:N/C:P/I:P/A:P
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: PARTIAL
availabilityImpact: PARTIAL
exploitabilityScore: 10.0
impactScore: 6.4
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.6

IVD: 0ad07d9e-1edf-11e6-abef-000c29c66e3d
severity: HIGH
baseScore: 7.5
vectorString: AV:N/AC:L/AU:N/C:P/I:P/A:P
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: PARTIAL
availabilityImpact: PARTIAL
exploitabilityScore: 10.0
impactScore: 6.4
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.9 [IVD]

Trust: 0.2

IVD: 1654b8d4-2352-11e6-abef-000c29c66e3d
severity: HIGH
baseScore: 7.5
vectorString: AV:N/AC:L/AU:N/C:P/I:P/A:P
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: PARTIAL
availabilityImpact: PARTIAL
exploitabilityScore: 10.0
impactScore: 6.4
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.9 [IVD]

Trust: 0.2

VULHUB: VHN-68256
severity: HIGH
baseScore: 7.5
vectorString: AV:N/AC:L/AU:N/C:P/I:P/A:P
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: PARTIAL
availabilityImpact: PARTIAL
exploitabilityScore: 10.0
impactScore: 6.4
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.1

sources: IVD: 0ad07d9e-1edf-11e6-abef-000c29c66e3d // IVD: 1654b8d4-2352-11e6-abef-000c29c66e3d // ZDI: ZDI-14-077 // CNVD: CNVD-2014-02243 // VULHUB: VHN-68256 // JVNDB: JVNDB-2014-001974 // CNNVD: CNNVD-201404-169 // NVD: CVE-2014-0763

PROBLEMTYPE DATA

problemtype:CWE-89

Trust: 1.9

sources: VULHUB: VHN-68256 // JVNDB: JVNDB-2014-001974 // NVD: CVE-2014-0763

THREAT TYPE

remote

Trust: 0.6

sources: CNNVD: CNNVD-201404-169

TYPE

SQL injection

Trust: 1.0

sources: IVD: 0ad07d9e-1edf-11e6-abef-000c29c66e3d // IVD: 1654b8d4-2352-11e6-abef-000c29c66e3d // CNNVD: CNNVD-201404-169

CONFIGURATIONS

sources: JVNDB: JVNDB-2014-001974

PATCH

title:Downloads ::: WebAccess Softwareurl:http://webaccess.advantech.com/downloads.php?item=software

Trust: 0.8

title:Advantech WebAccessurl:http://www.advantech.co.jp/products/GF-1M94V/Advantech-WebAccess/mod_B975C492-56B3-4EBA-8BBB-5B6D3483EE9D.aspx

Trust: 0.8

title:Advantech has issued an update to correct this vulnerability.url:https://ics-cert.us-cert.gov/advisories/ICSA-14-079-03

Trust: 0.7

title:Advantech WebAccess DBVisitor.dll special SOAP request SQL injection vulnerability patchurl:https://www.cnvd.org.cn/patchInfo/show/44778

Trust: 0.6

sources: ZDI: ZDI-14-077 // CNVD: CNVD-2014-02243 // JVNDB: JVNDB-2014-001974

EXTERNAL IDS

db:NVDid:CVE-2014-0763

Trust: 4.5

db:ICS CERTid:ICSA-14-079-03

Trust: 3.1

db:BIDid:66740

Trust: 2.0

db:CNVDid:CNVD-2014-02243

Trust: 1.0

db:CNNVDid:CNNVD-201404-169

Trust: 1.0

db:JVNDBid:JVNDB-2014-001974

Trust: 0.8

db:ZDI_CANid:ZDI-CAN-1938

Trust: 0.7

db:ZDIid:ZDI-14-077

Trust: 0.7

db:OSVDBid:105572

Trust: 0.6

db:SECUNIAid:57873

Trust: 0.6

db:IVDid:0AD07D9E-1EDF-11E6-ABEF-000C29C66E3D

Trust: 0.2

db:IVDid:1654B8D4-2352-11E6-ABEF-000C29C66E3D

Trust: 0.2

db:VULHUBid:VHN-68256

Trust: 0.1

sources: IVD: 0ad07d9e-1edf-11e6-abef-000c29c66e3d // IVD: 1654b8d4-2352-11e6-abef-000c29c66e3d // ZDI: ZDI-14-077 // CNVD: CNVD-2014-02243 // VULHUB: VHN-68256 // BID: 66740 // JVNDB: JVNDB-2014-001974 // CNNVD: CNNVD-201404-169 // NVD: CVE-2014-0763

REFERENCES

url:http://ics-cert.us-cert.gov/advisories/icsa-14-079-03

Trust: 3.8

url:http://www.securityfocus.com/bid/66740

Trust: 1.1

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2014-0763

Trust: 0.8

url:http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2014-0763

Trust: 0.8

url:http://osvdb.com/show/osvdb/105572

Trust: 0.6

url:http://secunia.com/advisories/57873

Trust: 0.6

sources: ZDI: ZDI-14-077 // CNVD: CNVD-2014-02243 // VULHUB: VHN-68256 // JVNDB: JVNDB-2014-001974 // CNNVD: CNNVD-201404-169 // NVD: CVE-2014-0763

CREDITS

Andrea Micalizzi aka rgod

Trust: 0.7

sources: ZDI: ZDI-14-077

SOURCES

db:IVDid:0ad07d9e-1edf-11e6-abef-000c29c66e3d
db:IVDid:1654b8d4-2352-11e6-abef-000c29c66e3d
db:ZDIid:ZDI-14-077
db:CNVDid:CNVD-2014-02243
db:VULHUBid:VHN-68256
db:BIDid:66740
db:JVNDBid:JVNDB-2014-001974
db:CNNVDid:CNNVD-201404-169
db:NVDid:CVE-2014-0763

LAST UPDATE DATE

2024-08-14T13:35:09.602000+00:00


SOURCES UPDATE DATE

db:ZDIid:ZDI-14-077date:2014-04-10T00:00:00
db:CNVDid:CNVD-2014-02243date:2014-04-11T00:00:00
db:VULHUBid:VHN-68256date:2015-07-24T00:00:00
db:BIDid:66740date:2014-04-17T00:40:00
db:JVNDBid:JVNDB-2014-001974date:2014-04-15T00:00:00
db:CNNVDid:CNNVD-201404-169date:2014-04-15T00:00:00
db:NVDid:CVE-2014-0763date:2015-07-24T18:39:23.993

SOURCES RELEASE DATE

db:IVDid:0ad07d9e-1edf-11e6-abef-000c29c66e3ddate:2014-04-11T00:00:00
db:IVDid:1654b8d4-2352-11e6-abef-000c29c66e3ddate:2014-04-11T00:00:00
db:ZDIid:ZDI-14-077date:2014-04-10T00:00:00
db:CNVDid:CNVD-2014-02243date:2014-04-11T00:00:00
db:VULHUBid:VHN-68256date:2014-04-12T00:00:00
db:BIDid:66740date:2014-04-08T00:00:00
db:JVNDBid:JVNDB-2014-001974date:2014-04-15T00:00:00
db:CNNVDid:CNNVD-201404-169date:2014-04-15T00:00:00
db:NVDid:CVE-2014-0763date:2014-04-12T04:37:31.440