CVE-2018-1131
CVSSN/A
发布时间 :2018-05-15 09:29:00
修订时间 :2018-05-15 09:29:00
NMPS    

[原文]Infinispan permits improper deserialization of trusted data via XML and JSON transcoders under certain server configurations. A user with authenticated access to the server could send a malicious object to a cache configured to accept certain types of objects, achieving code execution and possible further attacks. Versions 9.0.3.Final, 9.1.7.Final, 8.2.10.Final, 9.2.2.Final, 9.3.0.Alpha1 are believed to be affected.


[CNNVD]CNNVD数据暂缺。


[机译]译文暂缺.

- CVSS (基础分值)

CVSS暂不可用

- CPE (受影响的平台与产品)

产品及版本信息(CPE)暂不可用

- OVAL (用于检测的技术细节)

未找到相关OVAL定义

- 官方数据库链接

http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1131
(官方数据源) MITRE
http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2018-1131
(官方数据源) NVD

- 其它链接及资源

https://bugzilla.redhat.com/show_bug.cgi?id=1576492
(UNKNOWN)  CONFIRM  https://bugzilla.redhat.com/show_bug.cgi?id=1576492

- 漏洞信息 (F147705)

mySCADA myPRO 7 Hardcoded Credentials (PacketStormID:F147705)
2018-05-20 00:00:00
Emre AVANA  
exploit
CVE-2018-11311
[点击下载]

mySCADA myPRO version 7 has a hardcoded FTP username and password.

#Exploit Title: mySCADA myPRO 7 - Hardcoded FTP Username and Password
#Date: 2018-05-19
#Exploit Author: Emre AVANA
#Vendor Homepage: https://www.myscada.org/mypro/
#Software Link: https://www.myscada.org/download/
#Version: v7
#Tested on: Linux, Windows
 
# I. Problem Description
 
#In the latest version of myPRO (v7), it has been discovered that the ftp server's -running on port 2121-  username and password information is kept in the file by using reverse engineering. Anyone who connects to an FTP server with an authorized account can upload or download files onto the server running myPRO software.
 
# II. Technical 
 
Hardcoded username:password = myscada:Vikuk63
 
#Firstly, I found that what ports myPRO listened to. You can get information used by the netstat command about the ports and the services running on it. When you install myPRO, you can see many ports open. The vulnerability works on all supported platforms.
 
#In my first research on the Windows OS, myPRO has many process and I noticed that amyscadagate.exea is listening to port #2121. 
 
#I found that they put the username and password (myscada:Vikuk63) in the source code. I obtained access by connecting to port 2121 of myPRO's server with any FTP client.
 
#(Details: https://emreovunc.com/blog/en/mySCADA-myPRO7-Exploit.pdf)
 
# III. Solution
 
#As a workaround you need to restrict port 2121 access from the outside. There is no permanent solution for the vendor because there is no patch available.

    

- 漏洞信息

Infinispan CVE-2018-1131 Remote Code Execution Vulnerability
Input Validation Error 104218
Yes No
2018-05-14 12:00:00 2018-05-14 12:00:00
Unknown

- 受影响的程序版本

Redhat JBoss Data Grid 7.0.0
infinispan infinispan 9.3.0.Alpha1
infinispan infinispan 9.2.2.Final
infinispan infinispan 9.1.7.Final
infinispan infinispan 9.0.3.Final
infinispan infinispan 8.2.10.Final

- 漏洞讨论

Infinispan is prone to a remote code-execution vulnerability.

Successfully exploiting this issue allows attackers to execute arbitrary code in the context of the affected application.

Infinispan 9.0.3.Final, 9.1.7.Final, 8.2.10.Final, 9.2.2.Final, and 9.3.0.Alpha1 are vulnerable; other versions are also affected.

- 漏洞利用

Currently, we are not aware of any working exploits. If you feel we are in error or if you are aware of more recent information, please mail us at: vuldb@securityfocus.com.

- 解决方案

Currently we are not aware of any vendor-supplied patches. If you feel we are in error or if you are aware of more recent information, please mail us at: vuldb@securityfocus.com

- 相关参考

 

 

关于SCAP中文社区

SCAP中文社区是国内第一个以SCAP为主题的中文开放社区。了解更多信息,请查阅[关于本站]

版权声明

CVE/CWE/OVAL均为MITRE公司的注册商标,它们的官方数据源均保存在MITRE公司的相关网站