ID

VAR-201405-0535


CVE

CVE-2014-3789


TITLE

Cogent Real-Time Systems DataHub 'GetPermissions.asp' Remote code execution vulnerability

Trust: 1.3

sources: IVD: 7d7a6cd1-463f-11e9-b51a-000c29342cb1 // IVD: f6f85540-2351-11e6-abef-000c29c66e3d // CNVD: CNVD-2014-03106 // BID: 67486

DESCRIPTION

GetPermissions.asp in Cogent Real-Time Systems Cogent DataHub before 7.3.5 allows remote attackers to execute arbitrary commands via unspecified vectors. Authentication is not required to exploit this vulnerability. The specific flaw exists within the GetPermissions.asp component of the web server. Authentication is not required to exploit this vulnerability.The specific flaw exists within the EvalExpresssion method, which is available remotely through the AJAX facility. Using this method, it is possible to execute arbitrary Gamma code. Cogent DataHub is software for SCADA and automation. Versions prior to Cogent DataHub 7.3.5 are vulnerable

Trust: 4.32

sources: NVD: CVE-2014-3789 // JVNDB: JVNDB-2014-002621 // ZDI: ZDI-14-136 // ZDI: ZDI-15-438 // CNVD: CNVD-2014-03106 // BID: 67486 // BID: 76614 // IVD: 7d7a6cd1-463f-11e9-b51a-000c29342cb1 // IVD: f6f85540-2351-11e6-abef-000c29c66e3d

IOT TAXONOMY

category:['ICS']sub_category: -

Trust: 1.0

sources: IVD: 7d7a6cd1-463f-11e9-b51a-000c29342cb1 // IVD: f6f85540-2351-11e6-abef-000c29c66e3d // CNVD: CNVD-2014-03106

AFFECTED PRODUCTS

vendor:cogentdatahubmodel:cogent datahubscope:eqversion:7.3.1

Trust: 1.9

vendor:cogentdatahubmodel:cogent datahubscope:eqversion:7.3.0

Trust: 1.9

vendor:cogentdatahubmodel:cogent datahubscope:eqversion:7.2.2

Trust: 1.9

vendor:cogentdatahubmodel:cogent datahubscope:eqversion:7.1.2

Trust: 1.9

vendor:cogentdatahubmodel:cogent datahubscope:eqversion:7.1.1.63

Trust: 1.9

vendor:cogentdatahubmodel:cogent datahubscope:eqversion:7.1.1

Trust: 1.9

vendor:cogentdatahubmodel:cogent datahubscope:eqversion:7.1.0

Trust: 1.9

vendor:cogentdatahubmodel:cogent datahubscope:eqversion:7.0.2

Trust: 1.9

vendor:cogentdatahubmodel:cogent datahubscope:eqversion:7.0

Trust: 1.9

vendor:cogent real timemodel:datahubscope: - version: -

Trust: 1.4

vendor:cogentdatahubmodel:cogent datahubscope:eqversion:7.3.3

Trust: 1.0

vendor:cogentdatahubmodel:cogent datahubscope:eqversion:7.3.2

Trust: 1.0

vendor:cogentdatahubmodel:cogent datahubscope:lteversion:7.3.4

Trust: 1.0

vendor:cogent real timemodel:datahubscope:ltversion:7.3.5

Trust: 0.8

vendor:cogentmodel:real-time systems cogent datahubscope: - version: -

Trust: 0.6

vendor:cogentdatahubmodel:cogent datahubscope:eqversion:7.3.4

Trust: 0.6

vendor:cogent datahubmodel: - scope:eqversion:7.0

Trust: 0.4

vendor:cogent datahubmodel: - scope:eqversion:7.0.2

Trust: 0.4

vendor:cogent datahubmodel: - scope:eqversion:7.1.0

Trust: 0.4

vendor:cogent datahubmodel: - scope:eqversion:7.1.1

Trust: 0.4

vendor:cogent datahubmodel: - scope:eqversion:7.1.1.63

Trust: 0.4

vendor:cogent datahubmodel: - scope:eqversion:7.1.2

Trust: 0.4

vendor:cogent datahubmodel: - scope:eqversion:7.2.2

Trust: 0.4

vendor:cogent datahubmodel: - scope:eqversion:7.3.0

Trust: 0.4

vendor:cogent datahubmodel: - scope:eqversion:7.3.1

Trust: 0.4

vendor:cogent datahubmodel: - scope:eqversion:7.3.2

Trust: 0.4

vendor:cogent datahubmodel: - scope:eqversion:7.3.3

Trust: 0.4

vendor:cogent datahubmodel: - scope:eqversion:*

Trust: 0.4

vendor:cogentdatahubmodel:cogent datahubscope:eqversion:7.3.8

Trust: 0.3

vendor:cogentdatahubmodel:cogent datahubscope:eqversion:7

Trust: 0.3

vendor:cogentdatahubmodel:cogent datahubscope:neversion:7.3.9

Trust: 0.3

sources: IVD: 7d7a6cd1-463f-11e9-b51a-000c29342cb1 // IVD: f6f85540-2351-11e6-abef-000c29c66e3d // ZDI: ZDI-14-136 // ZDI: ZDI-15-438 // CNVD: CNVD-2014-03106 // BID: 76614 // JVNDB: JVNDB-2014-002621 // CNNVD: CNNVD-201405-459 // NVD: CVE-2014-3789

CVSS

SEVERITY

CVSSV2

CVSSV3

ZDI: CVE-2014-3789
value: HIGH

Trust: 1.4

nvd@nist.gov: CVE-2014-3789
value: HIGH

Trust: 1.0

NVD: CVE-2014-3789
value: HIGH

Trust: 0.8

CNVD: CNVD-2014-03106
value: HIGH

Trust: 0.6

CNNVD: CNNVD-201405-459
value: HIGH

Trust: 0.6

IVD: 7d7a6cd1-463f-11e9-b51a-000c29342cb1
value: HIGH

Trust: 0.2

IVD: f6f85540-2351-11e6-abef-000c29c66e3d
value: HIGH

Trust: 0.2

nvd@nist.gov: CVE-2014-3789
severity: HIGH
baseScore: 7.5
vectorString: AV:N/AC:L/AU:N/C:P/I:P/A:P
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: PARTIAL
availabilityImpact: PARTIAL
exploitabilityScore: 10.0
impactScore: 6.4
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 3.2

CNVD: CNVD-2014-03106
severity: HIGH
baseScore: 7.5
vectorString: AV:N/AC:L/AU:N/C:P/I:P/A:P
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: PARTIAL
availabilityImpact: PARTIAL
exploitabilityScore: 10.0
impactScore: 6.4
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.6

IVD: 7d7a6cd1-463f-11e9-b51a-000c29342cb1
severity: HIGH
baseScore: 7.5
vectorString: AV:N/AC:L/AU:N/C:P/I:P/A:P
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: PARTIAL
availabilityImpact: PARTIAL
exploitabilityScore: 10.0
impactScore: 6.4
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.9 [IVD]

Trust: 0.2

IVD: f6f85540-2351-11e6-abef-000c29c66e3d
severity: HIGH
baseScore: 7.5
vectorString: AV:N/AC:L/AU:N/C:P/I:P/A:P
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: PARTIAL
availabilityImpact: PARTIAL
exploitabilityScore: 10.0
impactScore: 6.4
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.9 [IVD]

Trust: 0.2

sources: IVD: 7d7a6cd1-463f-11e9-b51a-000c29342cb1 // IVD: f6f85540-2351-11e6-abef-000c29c66e3d // ZDI: ZDI-14-136 // ZDI: ZDI-15-438 // CNVD: CNVD-2014-03106 // JVNDB: JVNDB-2014-002621 // CNNVD: CNNVD-201405-459 // NVD: CVE-2014-3789

PROBLEMTYPE DATA

problemtype:CWE-94

Trust: 1.8

sources: JVNDB: JVNDB-2014-002621 // NVD: CVE-2014-3789

THREAT TYPE

network

Trust: 0.6

sources: BID: 67486 // BID: 76614

TYPE

Code injection

Trust: 1.0

sources: IVD: 7d7a6cd1-463f-11e9-b51a-000c29342cb1 // IVD: f6f85540-2351-11e6-abef-000c29c66e3d // CNNVD: CNNVD-201405-459

CONFIGURATIONS

sources: JVNDB: JVNDB-2014-002621

PATCH

title:Release Notesurl:http://cogentdatahub.com/ReleaseNotes.html

Trust: 1.5

title:Cogent Real-Time Systems has issued an update to correct this vulnerability.url:https://ics-cert.us-cert.gov/advisories/ICSA-15-246-01

Trust: 0.7

title:Cogent Real-Time Systems DataHub 'GetPermissions.asp' patch for remote code execution vulnerabilityurl:https://www.cnvd.org.cn/patchInfo/show/45728

Trust: 0.6

sources: ZDI: ZDI-14-136 // ZDI: ZDI-15-438 // CNVD: CNVD-2014-03106 // JVNDB: JVNDB-2014-002621

EXTERNAL IDS

db:NVDid:CVE-2014-3789

Trust: 5.4

db:ZDIid:ZDI-14-136

Trust: 4.0

db:BIDid:67486

Trust: 2.5

db:ICS CERTid:ICSA-15-246-01

Trust: 1.3

db:ICS CERTid:ICSA-14-198-01

Trust: 1.1

db:CNVDid:CNVD-2014-03106

Trust: 1.0

db:CNNVDid:CNNVD-201405-459

Trust: 1.0

db:JVNDBid:JVNDB-2014-002621

Trust: 0.8

db:ZDI_CANid:ZDI-CAN-2160

Trust: 0.7

db:ZDI_CANid:ZDI-CAN-2981

Trust: 0.7

db:ZDIid:ZDI-15-438

Trust: 0.7

db:BIDid:76614

Trust: 0.3

db:IVDid:7D7A6CD1-463F-11E9-B51A-000C29342CB1

Trust: 0.2

db:IVDid:F6F85540-2351-11E6-ABEF-000C29C66E3D

Trust: 0.2

sources: IVD: 7d7a6cd1-463f-11e9-b51a-000c29342cb1 // IVD: f6f85540-2351-11e6-abef-000c29c66e3d // ZDI: ZDI-14-136 // ZDI: ZDI-15-438 // CNVD: CNVD-2014-03106 // BID: 67486 // BID: 76614 // JVNDB: JVNDB-2014-002621 // CNNVD: CNNVD-201405-459 // NVD: CVE-2014-3789

REFERENCES

url:http://www.zerodayinitiative.com/advisories/zdi-14-136/

Trust: 3.3

url:http://cogentdatahub.com/releasenotes.html

Trust: 2.6

url:https://ics-cert.us-cert.gov/advisories/icsa-15-246-01

Trust: 2.0

url:http://www.securityfocus.com/bid/67486

Trust: 1.6

url:https://ics-cert.us-cert.gov/advisories/icsa-14-198-01

Trust: 1.1

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2014-3789

Trust: 0.8

url:http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2014-3789

Trust: 0.8

url:http://www.cogentdatahub.com/index.html

Trust: 0.3

url:http://cogentdatahub.com/index.html

Trust: 0.3

sources: ZDI: ZDI-14-136 // ZDI: ZDI-15-438 // CNVD: CNVD-2014-03106 // BID: 67486 // BID: 76614 // JVNDB: JVNDB-2014-002621 // CNNVD: CNNVD-201405-459 // NVD: CVE-2014-3789

CREDITS

John Leitch

Trust: 1.0

sources: ZDI: ZDI-14-136 // BID: 67486

SOURCES

db:IVDid:7d7a6cd1-463f-11e9-b51a-000c29342cb1
db:IVDid:f6f85540-2351-11e6-abef-000c29c66e3d
db:ZDIid:ZDI-14-136
db:ZDIid:ZDI-15-438
db:CNVDid:CNVD-2014-03106
db:BIDid:67486
db:BIDid:76614
db:JVNDBid:JVNDB-2014-002621
db:CNNVDid:CNNVD-201405-459
db:NVDid:CVE-2014-3789

LAST UPDATE DATE

2024-11-23T23:09:23.057000+00:00


SOURCES UPDATE DATE

db:ZDIid:ZDI-14-136date:2014-05-19T00:00:00
db:ZDIid:ZDI-15-438date:2015-09-08T00:00:00
db:CNVDid:CNVD-2014-03106date:2014-05-22T00:00:00
db:BIDid:67486date:2015-03-19T09:10:00
db:BIDid:76614date:2015-09-03T00:00:00
db:JVNDBid:JVNDB-2014-002621date:2014-07-22T00:00:00
db:CNNVDid:CNNVD-201405-459date:2014-05-26T00:00:00
db:NVDid:CVE-2014-3789date:2024-11-21T02:08:50.237

SOURCES RELEASE DATE

db:IVDid:7d7a6cd1-463f-11e9-b51a-000c29342cb1date:2014-05-22T00:00:00
db:IVDid:f6f85540-2351-11e6-abef-000c29c66e3ddate:2014-05-22T00:00:00
db:ZDIid:ZDI-14-136date:2014-05-19T00:00:00
db:ZDIid:ZDI-15-438date:2015-09-08T00:00:00
db:CNVDid:CNVD-2014-03106date:2014-05-21T00:00:00
db:BIDid:67486date:2014-05-19T00:00:00
db:BIDid:76614date:2015-09-03T00:00:00
db:JVNDBid:JVNDB-2014-002621date:2014-05-26T00:00:00
db:CNNVDid:CNNVD-201405-459date:2014-05-26T00:00:00
db:NVDid:CVE-2014-3789date:2014-05-22T23:55:03.767