CVE-2018-1131
CVSS6.5
发布时间 :2018-05-15 09:29:00
修订时间 :2018-06-22 12:08:19
NMPS    

[原文]Infinispan permits improper deserialization of trusted data via XML and JSON transcoders under certain server configurations. A user with authenticated access to the server could send a malicious object to a cache configured to accept certain types of objects, achieving code execution and possible further attacks. Versions 9.0.3.Final, 9.1.7.Final, 8.2.10.Final, 9.2.2.Final, 9.3.0.Alpha1 are believed to be affected.


[CNNVD]CNNVD数据暂缺。


[机译]译文暂缺.

- CVSS (基础分值)

CVSS分值: 6.5 [中等(MEDIUM)]
机密性影响: PARTIAL [很可能造成信息泄露]
完整性影响: PARTIAL [可能会导致系统文件被修改]
可用性影响: PARTIAL [可能会导致性能下降或中断资源访问]
攻击复杂度: LOW [漏洞利用没有访问限制 ]
攻击向量: NETWORK [攻击者不需要获取内网访问权或本地访问权]
身份认证: SINGLE_INSTANCE [--]

- CWE (弱点类目)

CWE-502 [可信数据的反序列化]

- CPE (受影响的平台与产品)

cpe:/a:infinispan:infinispan:8.2.10
cpe:/a:infinispan:infinispan:9.0.3
cpe:/a:infinispan:infinispan:9.1.7
cpe:/a:infinispan:infinispan:9.2.2
cpe:/a:infinispan:infinispan:9.3.0:alpha1
cpe:/a:redhat:jboss_data_grid:7.2

- OVAL (用于检测的技术细节)

未找到相关OVAL定义

- 官方数据库链接

http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1131
(官方数据源) MITRE
http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2018-1131
(官方数据源) NVD

- 其它链接及资源

http://www.securityfocus.com/bid/104218
(VENDOR_ADVISORY)  BID  104218
https://access.redhat.com/errata/RHSA-2018:1833
(VENDOR_ADVISORY)  REDHAT  RHSA-2018:1833
https://bugzilla.redhat.com/show_bug.cgi?id=1576492
(VENDOR_ADVISORY)  CONFIRM  https://bugzilla.redhat.com/show_bug.cgi?id=1576492

- 漏洞信息 (F147705)

mySCADA myPRO 7 Hardcoded Credentials (PacketStormID:F147705)
2018-05-20 00:00:00
Emre AVANA  
exploit
CVE-2018-11311
[点击下载]

mySCADA myPRO version 7 has a hardcoded FTP username and password.

#Exploit Title: mySCADA myPRO 7 - Hardcoded FTP Username and Password
#Date: 2018-05-19
#Exploit Author: Emre AVANA
#Vendor Homepage: https://www.myscada.org/mypro/
#Software Link: https://www.myscada.org/download/
#Version: v7
#Tested on: Linux, Windows
 
# I. Problem Description
 
#In the latest version of myPRO (v7), it has been discovered that the ftp server's -running on port 2121-  username and password information is kept in the file by using reverse engineering. Anyone who connects to an FTP server with an authorized account can upload or download files onto the server running myPRO software.
 
# II. Technical 
 
Hardcoded username:password = myscada:Vikuk63
 
#Firstly, I found that what ports myPRO listened to. You can get information used by the netstat command about the ports and the services running on it. When you install myPRO, you can see many ports open. The vulnerability works on all supported platforms.
 
#In my first research on the Windows OS, myPRO has many process and I noticed that amyscadagate.exea is listening to port #2121. 
 
#I found that they put the username and password (myscada:Vikuk63) in the source code. I obtained access by connecting to port 2121 of myPRO's server with any FTP client.
 
#(Details: https://emreovunc.com/blog/en/mySCADA-myPRO7-Exploit.pdf)
 
# III. Solution
 
#As a workaround you need to restrict port 2121 access from the outside. There is no permanent solution for the vendor because there is no patch available.

    

- 漏洞信息 (F148147)

Red Hat Security Advisory 2018-1833-01 (PacketStormID:F148147)
2018-06-12 00:00:00
Red Hat  
advisory
linux,redhat
CVE-2018-1131
[点击下载]

Red Hat Security Advisory 2018-1833-01 - Red Hat JBoss Data Grid is a distributed in-memory data grid based on Infinispan. This release of Red Hat JBoss Data Grid 7.2.1 serves as a replacement for Red Hat JBoss Data Grid 7.2.0 and includes bug fixes and enhancements. You can find a link to the Release Notes that describe these bug fixes and enhancements in the References section of this erratum. Issues addressed include a deserialization vulnerability.

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

=====================================================================
                   Red Hat Security Advisory

Synopsis:          Important: Red Hat JBoss Data Grid 7.2.1 security update
Advisory ID:       RHSA-2018:1833-01
Product:           Red Hat JBoss Data Grid
Advisory URL:      https://access.redhat.com/errata/RHSA-2018:1833
Issue date:        2018-06-12
CVE Names:         CVE-2018-1131 
=====================================================================

1. Summary:

An update for Red Hat JBoss Data Grid is now available.

Red Hat Product Security has rated this update as having a security impact
of Important. A Common Vulnerability Scoring System (CVSS) base score,
which gives a detailed severity rating, is available for each vulnerability
from the CVE link(s) in the References section.

2. Description:

Red Hat JBoss Data Grid is a distributed in-memory data grid based on
Infinispan.

This release of Red Hat JBoss Data Grid 7.2.1 serves as a replacement for
Red Hat JBoss Data Grid 7.2.0 and includes bug fixes and enhancements. You
can find a link to the Release Notes that describe these bug fixes and
enhancements in the References section of this erratum.

Security Fix(es):

* infinispan: deserialization of data in XML and JSON transcoders
(CVE-2018-1131)

For more details about the security issue(s), including the impact, a CVSS
score, and other related information, refer to the CVE page(s) listed in
the References section.

3. Solution:

Access the download location from the References section of this erratum.
You must log in to your Red Hat account to download the update.

Before applying the update, back up your existing Red Hat JBoss Data Grid
installation. You should back up databases, configuration files, and so on.

4. Bugs fixed (https://bugzilla.redhat.com/):

1576492 - CVE-2018-1131 infinispan: deserialization of data in XML and JSON transcoders

5. References:

https://access.redhat.com/security/cve/CVE-2018-1131
https://access.redhat.com/security/updates/classification/#important
https://access.redhat.com/jbossnetwork/restricted/listSoftware.html?product=data.grid&downloadType=distributions&version=7.2.1
https://access.redhat.com/documentation/en-US/Red_Hat_JBoss_Data_Grid/

6. Contact:

The Red Hat security contact is <secalert@redhat.com>. More contact
details at https://access.redhat.com/security/team/contact/

Copyright 2018 Red Hat, Inc.
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1
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=1B7R
-----END PGP SIGNATURE-----

--
RHSA-announce mailing list
RHSA-announce@redhat.com
https://www.redhat.com/mailman/listinfo/rhsa-announce
    

- 漏洞信息

Infinispan CVE-2018-1131 Remote Code Execution Vulnerability
Input Validation Error 104218
Yes No
2018-05-14 12:00:00 2018-05-14 12:00:00
Unknown

- 受影响的程序版本

Redhat JBoss Data Grid 7.0.0
infinispan infinispan 9.3.0.Alpha1
infinispan infinispan 9.2.2.Final
infinispan infinispan 9.1.7.Final
infinispan infinispan 9.0.3.Final
infinispan infinispan 8.2.10.Final

- 漏洞讨论

Infinispan is prone to a remote code-execution vulnerability.

Successfully exploiting this issue allows attackers to execute arbitrary code in the context of the affected application.

Infinispan 9.0.3.Final, 9.1.7.Final, 8.2.10.Final, 9.2.2.Final, and 9.3.0.Alpha1 are vulnerable; other versions are also affected.

- 漏洞利用

Currently, we are not aware of any working exploits. If you feel we are in error or if you are aware of more recent information, please mail us at: vuldb@securityfocus.com.

- 解决方案

Currently we are not aware of any vendor-supplied patches. If you feel we are in error or if you are aware of more recent information, please mail us at: vuldb@securityfocus.com

- 相关参考

 

 

关于SCAP中文社区

SCAP中文社区是国内第一个以SCAP为主题的中文开放社区。了解更多信息,请查阅[关于本站]

版权声明

CVE/CWE/OVAL均为MITRE公司的注册商标,它们的官方数据源均保存在MITRE公司的相关网站