ID

VAR-201809-0657


CVE

CVE-2018-1250


TITLE

Dell EMC Unity and UnityVSA Authorization vulnerability

Trust: 0.8

sources: JVNDB: JVNDB-2018-013131

DESCRIPTION

Dell EMC Unity and UnityVSA versions prior to 4.3.1.1525703027 contains an Authorization Bypass vulnerability. A remote authenticated user could potentially exploit this vulnerability to read files in NAS server by directly interacting with certain APIs of Unity OE, bypassing Role-Based Authorization control implemented only in Unisphere GUI. An authorization-bypass vulnerability 2. A cross-site scripting vulnerability 3. An URL-redirection vulnerability Exploiting these issues will allow an attacker to execute arbitrary script code in the browser of an unsuspecting user in the context of the affected site, carry out phishing attacks, and gain unauthorized access and perform unauthorized actions. UnityVSA is another version of it. A remote unauthenticated attacker could potentially exploit this vulnerability to redirect Unity users to arbitrary web URLs by tricking the victim user to click on a maliciously crafted Unisphere URL. Attacker could potentially phish information, including Unisphere users' credentials, from the victim once they are redirected. Customers can refer to Dell EMC target code information at: https://support.emc.com/docu39695_Target_Revisions_and_Adoption_Rates.pdf?language=en_US&language=en_US. Link to remedies: Registered Dell EMC Support customers can download Unity software from the Dell EMC Online Support web site. https://support.emc.com/downloads/39949_Dell-EMC-Unity-Family Severity Rating For an explanation of Severity Ratings, refer to Dell EMC Knowledgebase article 468307 (https://support.emc.com/kb/468307). Dell EMC recommends all customers take into account both the base score and any relevant temporal and environmental scores which may impact the potential severity associated with particular security vulnerability. Legal Information Read and use the information in this Dell EMC Security Advisory to assist in avoiding any situation that might arise from the problems described herein. If you have any questions regarding this advisory, contact Dell EMC Technical Support (https://support.emc.com/servicecenter/contactEMC/). Dell EMC recommends that all users determine the applicability of this information to their individual situations and take appropriate action. The information set forth herein is provided "as is" without warranty of any kind. Dell EMC disclaims all warranties, either express or implied, including the warranties of merchantability, fitness for a particular purpose, title and non-infringement. In no event, shall Dell EMC or its suppliers, be liable for any damages whatsoever including direct, indirect, incidental, consequential, loss of business profits or special damages, even if Dell EMC or its suppliers have been advised of the possibility of such damages. Some states do not allow the exclusion or limitation of liability for consequential or incidental damages, so the foregoing limitation may not apply. Dell Product Security Incident Response Team secure@dell.com -----BEGIN PGP SIGNATURE----- iQIzBAEBCAAdFiEEP5nobPoCj3pTvhAZgSlofD2Yi6cFAlug9xcACgkQgSlofD2Y i6eFlg/9Gbfu4dYSTr8/33bFt7zXktPR49cGBV6Y0TVFTKfvfu8aAPjd6rVzRn4C rmEviuxPvgGaa2P2d43DZulhlsfanNk4TNuIX1h8aoRZyj+9V6akDjVGAiojKlbG iAvnZYn5FEv///UlRTM+Ysn1LESFCcShKs1mg3XO5wkbwYfAGuD4qubrauHCkhlx Tbv6k73/qyyNXRrSb54xpJkZC9yuswvg+ledJ39r5YH4+JEZrnqAxUxos+emBO7y KHKkZdcf+oZqbBtONefmDG/84KxgT2+X/msfT0d4mSIDmnRwQl3gVAZW093ZpRM+ E2rS18RH75G4UzXmY+m2+I5lF6t+L8TvcxMgRP2/mkkC552FSujBhJNKUyfP7ral AP2DLMMXMrib8ddtVu9lk9HcBgATye2ibeu/Q2PUD7ld6gqGnFd7gJrexiT5Razq WCPEMjgIBXWZZ4qgp3aMq8lLXZ//Zyub1awql4JYZIr8oUjxmV8Lnp/0V6hTWAfX atznclE2+UGENlWqU4vOdhI+ZOeyn7bjrdUrktsAsvSg8LUECTtvjji5QsjLP+ui 57VcVKmX2j7+61mYslIs5HScgrEfubh73HL/Cm1JZ7aqsD1TUaGzlgqS/D2SMvL4 EgyXPpE3u9gBf0oNaNkbDNXyetLHIdmblJ8bz0zm00DoTMEaHZk= =LLPx -----END PGP SIGNATURE-----

Trust: 2.07

sources: NVD: CVE-2018-1250 // JVNDB: JVNDB-2018-013131 // BID: 107304 // VULHUB: VHN-122465 // PACKETSTORM: 149428

AFFECTED PRODUCTS

vendor:dellmodel:emc unityscope:ltversion:4.3.1.1525703027

Trust: 1.0

vendor:dellmodel:emc unityvsascope:ltversion:4.3.1.1525703027

Trust: 1.0

vendor:dellmodel:emc unity operating environmentscope:ltversion:4.3.1.1525703027

Trust: 0.8

vendor:dellmodel:emc unityvsa operating environmentscope:ltversion:4.3.1.1525703027

Trust: 0.8

vendor:emcmodel:unityvsa operating environmentscope:eqversion:4.3.1

Trust: 0.3

vendor:emcmodel:unityvsa operating environmentscope:eqversion:4.3.0.1522077968

Trust: 0.3

vendor:emcmodel:unity operating environmentscope:eqversion:4.3.1

Trust: 0.3

vendor:emcmodel:unity operating environmentscope:eqversion:4.3.0.1522077968

Trust: 0.3

vendor:dellmodel:emc unityvsa operating environmentscope:neversion:4.3.1.1525703027

Trust: 0.3

vendor:dellmodel:emc unity operating environmentscope:neversion:4.3.1.1525703027

Trust: 0.3

sources: BID: 107304 // JVNDB: JVNDB-2018-013131 // NVD: CVE-2018-1250

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2018-1250
value: MEDIUM

Trust: 1.0

security_alert@emc.com: CVE-2018-1250
value: MEDIUM

Trust: 1.0

NVD: CVE-2018-1250
value: MEDIUM

Trust: 0.8

CNNVD: CNNVD-201809-1286
value: MEDIUM

Trust: 0.6

VULHUB: VHN-122465
value: MEDIUM

Trust: 0.1

nvd@nist.gov: CVE-2018-1250
severity: MEDIUM
baseScore: 4.0
vectorString: AV:N/AC:L/AU:S/C:P/I:N/A:N
accessVector: NETWORK
accessComplexity: LOW
authentication: SINGLE
confidentialityImpact: PARTIAL
integrityImpact: NONE
availabilityImpact: NONE
exploitabilityScore: 8.0
impactScore: 2.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.8

VULHUB: VHN-122465
severity: MEDIUM
baseScore: 4.0
vectorString: AV:N/AC:L/AU:S/C:P/I:N/A:N
accessVector: NETWORK
accessComplexity: LOW
authentication: SINGLE
confidentialityImpact: PARTIAL
integrityImpact: NONE
availabilityImpact: NONE
exploitabilityScore: 8.0
impactScore: 2.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.1

nvd@nist.gov: CVE-2018-1250
baseSeverity: MEDIUM
baseScore: 6.5
vectorString: CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
attackVector: NETWORK
attackComplexity: LOW
privilegesRequired: LOW
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: HIGH
integrityImpact: NONE
availabilityImpact: NONE
exploitabilityScore: 2.8
impactScore: 3.6
version: 3.0

Trust: 2.8

sources: VULHUB: VHN-122465 // JVNDB: JVNDB-2018-013131 // CNNVD: CNNVD-201809-1286 // NVD: CVE-2018-1250 // NVD: CVE-2018-1250

PROBLEMTYPE DATA

problemtype:CWE-863

Trust: 1.1

problemtype:CWE-285

Trust: 0.8

sources: VULHUB: VHN-122465 // JVNDB: JVNDB-2018-013131 // NVD: CVE-2018-1250

THREAT TYPE

remote

Trust: 0.6

sources: CNNVD: CNNVD-201809-1286

TYPE

lack of information

Trust: 0.6

sources: CNNVD: CNNVD-201809-1286

CONFIGURATIONS

sources: JVNDB: JVNDB-2018-013131

PATCH

title:An Introduction to Unity Software | Dell EMC USurl:https://www.dellemc.com/en-us/documentation/unity-family/unity-p-software-upgrades/01-unity-upg-br-introduction.htm

Trust: 0.8

title:Dell EMC UnityVSAurl:https://www.dellemc.com/en-us/products-solutions/trial-software-download/unity-vsa.htm

Trust: 0.8

title:Dell EMC Unity Operating Environment Security vulnerabilitiesurl:http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=85292

Trust: 0.6

sources: JVNDB: JVNDB-2018-013131 // CNNVD: CNNVD-201809-1286

EXTERNAL IDS

db:NVDid:CVE-2018-1250

Trust: 2.9

db:JVNDBid:JVNDB-2018-013131

Trust: 0.8

db:CNNVDid:CNNVD-201809-1286

Trust: 0.7

db:BIDid:107304

Trust: 0.3

db:VULHUBid:VHN-122465

Trust: 0.1

db:PACKETSTORMid:149428

Trust: 0.1

sources: VULHUB: VHN-122465 // BID: 107304 // JVNDB: JVNDB-2018-013131 // PACKETSTORM: 149428 // CNNVD: CNNVD-201809-1286 // NVD: CVE-2018-1250

REFERENCES

url:https://seclists.org/fulldisclosure/2018/sep/30

Trust: 2.8

url:https://nvd.nist.gov/vuln/detail/cve-2018-1250

Trust: 0.9

url:https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2018-1250

Trust: 0.8

url:http://www.emc.com/

Trust: 0.3

url:https://support.emc.com/servicecenter/contactemc/).

Trust: 0.1

url:https://support.emc.com/downloads/39949_dell-emc-unity-family

Trust: 0.1

url:https://support.emc.com/docu39695_target_revisions_and_adoption_rates.pdf?language=en_us&language=en_us.

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2018-1251

Trust: 0.1

url:https://support.emc.com/kb/468307).

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2018-1246

Trust: 0.1

sources: VULHUB: VHN-122465 // BID: 107304 // JVNDB: JVNDB-2018-013131 // PACKETSTORM: 149428 // CNNVD: CNNVD-201809-1286 // NVD: CVE-2018-1250

CREDITS

The vendor reported this issue.

Trust: 0.3

sources: BID: 107304

SOURCES

db:VULHUBid:VHN-122465
db:BIDid:107304
db:JVNDBid:JVNDB-2018-013131
db:PACKETSTORMid:149428
db:CNNVDid:CNNVD-201809-1286
db:NVDid:CVE-2018-1250

LAST UPDATE DATE

2024-11-23T21:38:18.494000+00:00


SOURCES UPDATE DATE

db:VULHUBid:VHN-122465date:2019-10-09T00:00:00
db:BIDid:107304date:2018-09-18T00:00:00
db:JVNDBid:JVNDB-2018-013131date:2019-02-15T00:00:00
db:CNNVDid:CNNVD-201809-1286date:2019-10-17T00:00:00
db:NVDid:CVE-2018-1250date:2024-11-21T03:59:27.950

SOURCES RELEASE DATE

db:VULHUBid:VHN-122465date:2018-09-28T00:00:00
db:BIDid:107304date:2018-09-18T00:00:00
db:JVNDBid:JVNDB-2018-013131date:2019-02-15T00:00:00
db:PACKETSTORMid:149428date:2018-09-19T01:45:51
db:CNNVDid:CNNVD-201809-1286date:2018-09-29T00:00:00
db:NVDid:CVE-2018-1250date:2018-09-28T18:29:00.973