发布时间 :2018-05-25 11:29:00
修订时间 :2018-06-27 07:13:14

[原文]PI Coresight 2016 R2 contains a cross-site request forgery vulnerability that may allow access to the PI system. OSIsoft recommends that users upgrade to PI Vision 2017 or greater to mitigate this vulnerability.



- CVSS (基础分值)

CVSS分值: 6.8 [中等(MEDIUM)]
机密性影响: PARTIAL [很可能造成信息泄露]
完整性影响: PARTIAL [可能会导致系统文件被修改]
可用性影响: PARTIAL [可能会导致性能下降或中断资源访问]
攻击复杂度: MEDIUM [漏洞利用存在一定的访问条件]
攻击向量: NETWORK [攻击者不需要获取内网访问权或本地访问权]
身份认证: NONE [漏洞利用无需身份认证]

- CWE (弱点类目)

CWE-352 [跨站请求伪造(CSRF)]

- CPE (受影响的平台与产品)


- OVAL (用于检测的技术细节)


- 官方数据库链接
(官方数据源) MITRE
(官方数据源) NVD

- 其它链接及资源

- 漏洞信息

OSIsoft PI Coresight CVE-2017-9641 Cross Site Request Forgery Vulnerability
Input Validation Error 99540
Yes No
2017-07-11 12:00:00 2017-07-11 12:00:00

- 受影响的程序版本

OSISoft PI Coresight 2016 0
OSISoft PI Coresight 2016 R2
,OSISoft PI Coresight 2017

- 不受影响的程序版本

OSISoft PI Coresight 2017

- 漏洞讨论

OSIsoft PI Coresight is prone to a cross-site request-forgery vulnerability because it fails to properly validate HTTP requests.

Exploiting this issue may allow a remote attacker to perform certain unauthorized actions and gain access to the affected application. Other attacks are also possible.

OSIsoft PI Coresight 2016 R2 and earlier are vulnerable.

- 漏洞利用

Currently, we are not aware of any working exploits. If you feel we are in error or if you are aware of more recent information, please mail us at:

- 解决方案

Updates are available. Please see the references or vendor advisory for more information.

- 相关参考