René Helmke 7791f18b51 bootstrap
2023-05-16 16:09:41 +02:00

204 lines
6.5 KiB
JSON

{
"id": "CVE-2011-4876",
"sourceIdentifier": "cret@cert.org",
"published": "2012-02-03T20:55:01.937",
"lastModified": "2017-08-29T01:30:37.210",
"vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
"value": "Directory traversal vulnerability in HmiLoad in the runtime loader in Siemens WinCC flexible 2004, 2005, 2007, and 2008; WinCC V11 (aka TIA portal); the TP, OP, MP, Comfort Panels, and Mobile Panels SIMATIC HMI panels; WinCC V11 Runtime Advanced; and WinCC flexible Runtime, when Transfer Mode is enabled, allows remote attackers to execute, read, create, modify, or delete arbitrary files via a .. (dot dot) in a string."
},
{
"lang": "es",
"value": "Vulnerabilidad de salto de directorio en HmiLoad del cargador de tiempo de ejecuci\u00f3n (\"runtime loader\") de Siemens WinCC flexible 2004, 2005, 2007, and 2008; WinCC V11 (TIA portal); the TP, OP, MP, Comfort Panels, and Mobile Panels SIMATIC HMI panels; WinCC V11 Runtime Advanced; y WinCC flexible Runtime, si el modo de transferencia (\"Transfer Mode\") est\u00e1 habilitado, permite a atacantes remotos ejecutar, leer, crear, modificar o borrar archivos arbitrarios a trav\u00e9s de los caracteres .. (punto punto) en una cadena."
}
],
"metrics": {
"cvssMetricV2": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "2.0",
"vectorString": "AV:N/AC:M/Au:N/C:C/I:C/A:C",
"accessVector": "NETWORK",
"accessComplexity": "MEDIUM",
"authentication": "NONE",
"confidentialityImpact": "COMPLETE",
"integrityImpact": "COMPLETE",
"availabilityImpact": "COMPLETE",
"baseScore": 9.3
},
"baseSeverity": "HIGH",
"exploitabilityScore": 8.6,
"impactScore": 10.0,
"acInsufInfo": false,
"obtainAllPrivilege": false,
"obtainUserPrivilege": false,
"obtainOtherPrivilege": false,
"userInteractionRequired": false
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-22"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:siemens:wincc_flexible:2004:*:*:*:*:*:*:*",
"matchCriteriaId": "7D596C29-36F8-44F2-897D-FD107769E5A9"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:siemens:wincc_flexible:2005:*:*:*:*:*:*:*",
"matchCriteriaId": "2D84E29A-4BC2-4229-83C3-D9F7A641D19C"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:siemens:wincc_flexible:2007:*:*:*:*:*:*:*",
"matchCriteriaId": "9B3ADDE1-1F91-43E7-A3C3-3069916F4B23"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:siemens:wincc_flexible:2008:*:*:*:*:*:*:*",
"matchCriteriaId": "1432EC7A-47B2-41D1-B90B-72DBB79AC266"
}
]
}
]
},
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:siemens:wincc:v11:*:*:*:*:*:*:*",
"matchCriteriaId": "18A9883B-80E1-4B2E-88DA-D2326AE3DC08"
}
]
}
]
},
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:siemens:simatic_hmi_panels:comfort_panels:*:*:*:*:*:*:*",
"matchCriteriaId": "DC593746-B329-43EA-8CA1-AA56AC5A3B10"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:siemens:simatic_hmi_panels:mobile_panels:*:*:*:*:*:*:*",
"matchCriteriaId": "1DF877E8-A0D1-4444-99F2-8A3E8ED4D31B"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:siemens:simatic_hmi_panels:mp:*:*:*:*:*:*:*",
"matchCriteriaId": "442AC914-BDD5-4D0C-9E04-88F60EE2B730"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:siemens:simatic_hmi_panels:op:*:*:*:*:*:*:*",
"matchCriteriaId": "D9749966-1666-4F7D-90D0-17AFBB88AE83"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:siemens:simatic_hmi_panels:tp:*:*:*:*:*:*:*",
"matchCriteriaId": "9471D239-08B1-4076-82F7-2B73F4E343CE"
}
]
}
]
},
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:siemens:wincc_runtime_advanced:v11:*:*:*:*:*:*:*",
"matchCriteriaId": "1AE3AE80-C7A2-4581-993A-536936F6D315"
}
]
}
]
},
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:siemens:wincc_flexible_runtime:*:*:*:*:*:*:*:*",
"matchCriteriaId": "6F785262-BBFB-4A0C-A7DC-97F5D6B94BB0"
}
]
}
]
}
],
"references": [
{
"url": "http://aluigi.org/adv/winccflex_1-adv.txt",
"source": "cret@cert.org"
},
{
"url": "http://www.exploit-db.com/exploits/18166",
"source": "cret@cert.org"
},
{
"url": "http://www.siemens.com/corporate-technology/pool/de/forschungsfelder/siemens_security_advisory_ssa-345442.pdf",
"source": "cret@cert.org",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.us-cert.gov/control_systems/pdf/ICS-ALERT-11-332-02.pdf",
"source": "cret@cert.org"
},
{
"url": "http://www.us-cert.gov/control_systems/pdf/ICS-ALERT-11-332-02A.pdf",
"source": "cret@cert.org"
},
{
"url": "http://www.us-cert.gov/control_systems/pdf/ICSA-12-030-01.pdf",
"source": "cret@cert.org",
"tags": [
"US Government Resource"
]
},
{
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/71450",
"source": "cret@cert.org"
}
]
}