mirror of
https://github.com/CVEProject/cvelist.git
synced 2025-07-29 05:56:59 +00:00
216 lines
9.5 KiB
JSON
216 lines
9.5 KiB
JSON
{
|
|
"CVE_data_meta": {
|
|
"ASSIGNER": "productsecurity@jci.com",
|
|
"ID": "CVE-2020-9044",
|
|
"STATE": "PUBLIC",
|
|
"TITLE": "Metasys Improper Restriction of XML External Entity Reference"
|
|
},
|
|
"affects": {
|
|
"vendor": {
|
|
"vendor_data": [
|
|
{
|
|
"vendor_name": "Johnson Controls",
|
|
"product": {
|
|
"product_data": [
|
|
{
|
|
"product_name": "Metasys Application and Data Server (ADS, ADS-Lite)",
|
|
"version": {
|
|
"version_data": [
|
|
{
|
|
"version_value": "versions 10.1 and prior"
|
|
}
|
|
]
|
|
}
|
|
},
|
|
{
|
|
"product_name": "Metasys Extended Application and Data Server (ADX)",
|
|
"version": {
|
|
"version_data": [
|
|
{
|
|
"version_value": "versions 10.1 and prior"
|
|
}
|
|
]
|
|
}
|
|
},
|
|
{
|
|
"product_name": "Metasys Open Data Server (ODS)",
|
|
"version": {
|
|
"version_data": [
|
|
{
|
|
"version_value": "versions 10.1 and prior"
|
|
}
|
|
]
|
|
}
|
|
},
|
|
{
|
|
"product_name": "Metasys Open Application Server (OAS)",
|
|
"version": {
|
|
"version_data": [
|
|
{
|
|
"version_value": "version 10.1"
|
|
}
|
|
]
|
|
}
|
|
},
|
|
{
|
|
"product_name": "Metasys Network Automation Engine (NAE55 only)",
|
|
"version": {
|
|
"version_data": [
|
|
{
|
|
"version_value": "versions 9.0.1"
|
|
},
|
|
{
|
|
"version_value": "9.0.2"
|
|
},
|
|
{
|
|
"version_value": "9.0.3"
|
|
},
|
|
{
|
|
"version_value": "9.0.5"
|
|
},
|
|
{
|
|
"version_value": "9.0.6"
|
|
}
|
|
]
|
|
}
|
|
},
|
|
{
|
|
"product_name": "Metasys Network Integration Engine (NIE55/NIE59)",
|
|
"version": {
|
|
"version_data": [
|
|
{
|
|
"version_value": "versions 9.0.1"
|
|
},
|
|
{
|
|
"version_value": "9.0.2"
|
|
},
|
|
{
|
|
"version_value": "9.0.3"
|
|
},
|
|
{
|
|
"version_value": "9.0.5"
|
|
},
|
|
{
|
|
"version_value": "9.0.6"
|
|
}
|
|
]
|
|
}
|
|
},
|
|
{
|
|
"product_name": "Metasys NAE85 and NIE85",
|
|
"version": {
|
|
"version_data": [
|
|
{
|
|
"version_value": "versions 10.1 and prior"
|
|
}
|
|
]
|
|
}
|
|
},
|
|
{
|
|
"product_name": "Metasys LonWorks Control Server (LCS)",
|
|
"version": {
|
|
"version_data": [
|
|
{
|
|
"version_value": "versions 10.1 and prior"
|
|
}
|
|
]
|
|
}
|
|
},
|
|
{
|
|
"product_name": "Metasys System Configuration Tool (SCT)",
|
|
"version": {
|
|
"version_data": [
|
|
{
|
|
"version_value": "versions 13.2 and prior"
|
|
}
|
|
]
|
|
}
|
|
},
|
|
{
|
|
"product_name": "Metasys Smoke Control Network Automation Engine (NAE55, UL 864 UUKL/ORD-C100-13 UUKLC 10th Edition Listed)",
|
|
"version": {
|
|
"version_data": [
|
|
{
|
|
"version_value": "version 8.1"
|
|
}
|
|
]
|
|
}
|
|
}
|
|
]
|
|
}
|
|
}
|
|
]
|
|
}
|
|
},
|
|
"credit": [
|
|
{
|
|
"lang": "eng",
|
|
"value": "Lukasz Rupala"
|
|
}
|
|
],
|
|
"data_format": "MITRE",
|
|
"data_type": "CVE",
|
|
"data_version": "4.0",
|
|
"description": {
|
|
"description_data": [
|
|
{
|
|
"lang": "eng",
|
|
"value": "XXE vulnerability exists in the Metasys family of product Web Services which has the potential to facilitate DoS attacks or harvesting of ASCII server files. This affects Johnson Controls' Metasys Application and Data Server (ADS, ADS-Lite) versions 10.1 and prior; Metasys Extended Application and Data Server (ADX) versions 10.1 and prior; Metasys Open Data Server (ODS) versions 10.1 and prior; Metasys Open Application Server (OAS) version 10.1; Metasys Network Automation Engine (NAE55 only) versions 9.0.1, 9.0.2, 9.0.3, 9.0.5, 9.0.6; Metasys Network Integration Engine (NIE55/NIE59) versions 9.0.1, 9.0.2, 9.0.3, 9.0.5, 9.0.6; Metasys NAE85 and NIE85 versions 10.1 and prior; Metasys LonWorks Control Server (LCS) versions 10.1 and prior; Metasys System Configuration Tool (SCT) versions 13.2 and prior; Metasys Smoke Control Network Automation Engine (NAE55, UL 864 UUKL/ORD-C100-13 UUKLC 10th Edition Listed) version 8.1."
|
|
}
|
|
]
|
|
},
|
|
"generator": {
|
|
"engine": "Vulnogram 0.0.9"
|
|
},
|
|
"impact": {
|
|
"cvss": {
|
|
"attackComplexity": "LOW",
|
|
"attackVector": "NETWORK",
|
|
"availabilityImpact": "HIGH",
|
|
"baseScore": 7.5,
|
|
"baseSeverity": "HIGH",
|
|
"confidentialityImpact": "NONE",
|
|
"integrityImpact": "NONE",
|
|
"privilegesRequired": "NONE",
|
|
"scope": "UNCHANGED",
|
|
"userInteraction": "NONE",
|
|
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
|
|
"version": "3.1"
|
|
}
|
|
},
|
|
"problemtype": {
|
|
"problemtype_data": [
|
|
{
|
|
"description": [
|
|
{
|
|
"lang": "eng",
|
|
"value": "CWE-611 - Information Leak Through XML External Entity File Disclosure "
|
|
}
|
|
]
|
|
}
|
|
]
|
|
},
|
|
"references": {
|
|
"reference_data": [
|
|
{
|
|
"name": "https://www.johnsoncontrols.com/cyber-solutions/security-advisories",
|
|
"refsource": "CONFIRM",
|
|
"url": "https://www.johnsoncontrols.com/cyber-solutions/security-advisories"
|
|
},
|
|
{
|
|
"name": "ICS-CERT Advisory",
|
|
"refsource": "CERT",
|
|
"url": "https://www.us-cert.gov/ics/advisories/icsa-20-070-05"
|
|
}
|
|
]
|
|
},
|
|
"solution": [
|
|
{
|
|
"lang": "eng",
|
|
"value": "Johnson Controls has developed a patch to address this issue. Customers should contact their local branch office for remediation. "
|
|
}
|
|
],
|
|
"source": {
|
|
"discovery": "EXTERNAL"
|
|
}
|
|
} |