VAR-201010-0437
Vulnerability from variot - Updated: 2022-05-17 02:07Intellicom NetBiter is a hardware device that is managed using the WebSCADA protocol. The Intellicom Netbiter webSCADA product 'read.cgi' has multiple security vulnerabilities that allow attackers to obtain sensitive information. - Local files are available through directory traversal attacks: /cgi-bin/read.cgi?page=../../../../../../../../../.. /../etc/passwd%00- can submit the following request for sensitive information: /cgi-bin/read.cgi?file=/home/config/users.cfg - by injecting a specially constructed GIF image on the LOGO page modification Upload malicious code: /cgi-bin/read.cgi?page=config.html&file=/home/config/pages/2.conf§ion=PAGE2GIF Hide malicious code in image content for SCADA server management and unauthorized OS command execution. An attacker can exploit these issues to upload and execute arbitrary script code on an affected computer with the privileges of the webserver process, view arbitrary local files, or obtain sensitive data that can aid in further attacks. Netbiter webSCADA WS100 and Netbiter webSCADA WS200 are vulnerable; other versions may also be affected
Show details on source website{
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#",
"affected_products": {
"@id": "https://www.variotdbs.pl/ref/affected_products"
},
"configurations": {
"@id": "https://www.variotdbs.pl/ref/configurations"
},
"credits": {
"@id": "https://www.variotdbs.pl/ref/credits"
},
"cvss": {
"@id": "https://www.variotdbs.pl/ref/cvss/"
},
"description": {
"@id": "https://www.variotdbs.pl/ref/description/"
},
"exploit_availability": {
"@id": "https://www.variotdbs.pl/ref/exploit_availability/"
},
"external_ids": {
"@id": "https://www.variotdbs.pl/ref/external_ids/"
},
"iot": {
"@id": "https://www.variotdbs.pl/ref/iot/"
},
"iot_taxonomy": {
"@id": "https://www.variotdbs.pl/ref/iot_taxonomy/"
},
"patch": {
"@id": "https://www.variotdbs.pl/ref/patch/"
},
"problemtype_data": {
"@id": "https://www.variotdbs.pl/ref/problemtype_data/"
},
"references": {
"@id": "https://www.variotdbs.pl/ref/references/"
},
"sources": {
"@id": "https://www.variotdbs.pl/ref/sources/"
},
"sources_release_date": {
"@id": "https://www.variotdbs.pl/ref/sources_release_date/"
},
"sources_update_date": {
"@id": "https://www.variotdbs.pl/ref/sources_update_date/"
},
"threat_type": {
"@id": "https://www.variotdbs.pl/ref/threat_type/"
},
"title": {
"@id": "https://www.variotdbs.pl/ref/title/"
},
"type": {
"@id": "https://www.variotdbs.pl/ref/type/"
}
},
"@id": "https://www.variotdbs.pl/vuln/VAR-201010-0437",
"affected_products": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/affected_products#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
},
"@id": "https://www.variotdbs.pl/ref/sources"
}
},
"data": [
{
"model": "innovation netbiter webscada ws200/ws100",
"scope": null,
"trust": 0.6,
"vendor": "intellicom",
"version": null
},
{
"model": "innovation netbiter webscada ws200/ws100",
"scope": "eq",
"trust": 0.4,
"vendor": "intellicom",
"version": "*"
},
{
"model": "innovation netbiter webscada ws200",
"scope": "eq",
"trust": 0.3,
"vendor": "intellicom",
"version": "0"
},
{
"model": "innovation netbiter webscada ws100",
"scope": "eq",
"trust": 0.3,
"vendor": "intellicom",
"version": "0"
}
],
"sources": [
{
"db": "IVD",
"id": "7d7e3d5e-463f-11e9-bcc2-000c29342cb1"
},
{
"db": "IVD",
"id": "8fa72c7e-1fad-11e6-abef-000c29c66e3d"
},
{
"db": "CNVD",
"id": "CNVD-2010-2238"
},
{
"db": "BID",
"id": "43636"
}
]
},
"credits": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/credits#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "Eugene Salov and Andrej Komarov",
"sources": [
{
"db": "BID",
"id": "43636"
}
],
"trust": 0.3
},
"cvss": {
"@context": {
"cvssV2": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/cvssV2"
},
"cvssV3": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/"
},
"severity": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/cvss/severity#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/severity"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
},
"@id": "https://www.variotdbs.pl/ref/sources"
}
},
"data": [
{
"cvssV2": [
{
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"author": "IVD",
"availabilityImpact": "PARTIAL",
"baseScore": 7.5,
"confidentialityImpact": "PARTIAL",
"exploitabilityScore": 10.0,
"id": "7d7e3d5e-463f-11e9-bcc2-000c29342cb1",
"impactScore": 6.4,
"integrityImpact": "PARTIAL",
"severity": "HIGH",
"trust": 0.2,
"vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
"version": "2.9 [IVD]"
},
{
"accessComplexity": null,
"accessVector": null,
"authentication": null,
"author": "IVD",
"availabilityImpact": null,
"baseScore": null,
"confidentialityImpact": null,
"exploitabilityScore": null,
"id": "8fa72c7e-1fad-11e6-abef-000c29c66e3d",
"impactScore": null,
"integrityImpact": null,
"severity": null,
"trust": 0.2,
"vectorString": null,
"version": "unknown"
}
],
"cvssV3": [],
"severity": [
{
"author": "IVD",
"id": "7d7e3d5e-463f-11e9-bcc2-000c29342cb1",
"trust": 0.2,
"value": "HIGH"
},
{
"author": "IVD",
"id": "8fa72c7e-1fad-11e6-abef-000c29c66e3d",
"trust": 0.2,
"value": "LOW"
}
]
}
],
"sources": [
{
"db": "IVD",
"id": "7d7e3d5e-463f-11e9-bcc2-000c29342cb1"
},
{
"db": "IVD",
"id": "8fa72c7e-1fad-11e6-abef-000c29c66e3d"
}
]
},
"description": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/description#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "Intellicom NetBiter is a hardware device that is managed using the WebSCADA protocol. The Intellicom Netbiter webSCADA product \u0027read.cgi\u0027 has multiple security vulnerabilities that allow attackers to obtain sensitive information. - Local files are available through directory traversal attacks: /cgi-bin/read.cgi?page=../../../../../../../../../.. /../etc/passwd%00- can submit the following request for sensitive information: /cgi-bin/read.cgi?file=/home/config/users.cfg - by injecting a specially constructed GIF image on the LOGO page modification Upload malicious code: /cgi-bin/read.cgi?page=config.html\u0026file=/home/config/pages/2.conf\u0026section=PAGE2GIF Hide malicious code in image content for SCADA server management and unauthorized OS command execution. \nAn attacker can exploit these issues to upload and execute arbitrary script code on an affected computer with the privileges of the webserver process, view arbitrary local files, or obtain sensitive data that can aid in further attacks. \nNetbiter webSCADA WS100 and Netbiter webSCADA WS200 are vulnerable; other versions may also be affected",
"sources": [
{
"db": "CNVD",
"id": "CNVD-2010-2238"
},
{
"db": "BID",
"id": "43636"
},
{
"db": "IVD",
"id": "7d7e3d5e-463f-11e9-bcc2-000c29342cb1"
},
{
"db": "IVD",
"id": "8fa72c7e-1fad-11e6-abef-000c29c66e3d"
}
],
"trust": 1.17
},
"external_ids": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/external_ids#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"db": "CNVD",
"id": "CNVD-2010-2238",
"trust": 1.0
},
{
"db": "BID",
"id": "43636",
"trust": 0.9
},
{
"db": "IVD",
"id": "7D7E3D5E-463F-11E9-BCC2-000C29342CB1",
"trust": 0.2
},
{
"db": "IVD",
"id": "8FA72C7E-1FAD-11E6-ABEF-000C29C66E3D",
"trust": 0.2
}
],
"sources": [
{
"db": "IVD",
"id": "7d7e3d5e-463f-11e9-bcc2-000c29342cb1"
},
{
"db": "IVD",
"id": "8fa72c7e-1fad-11e6-abef-000c29c66e3d"
},
{
"db": "CNVD",
"id": "CNVD-2010-2238"
},
{
"db": "BID",
"id": "43636"
}
]
},
"id": "VAR-201010-0437",
"iot": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/iot#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": true,
"sources": [
{
"db": "IVD",
"id": "7d7e3d5e-463f-11e9-bcc2-000c29342cb1"
},
{
"db": "IVD",
"id": "8fa72c7e-1fad-11e6-abef-000c29c66e3d"
},
{
"db": "CNVD",
"id": "CNVD-2010-2238"
}
],
"trust": 2.0
},
"iot_taxonomy": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/iot_taxonomy#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"category": [
"ICS",
"Network device"
],
"sub_category": null,
"trust": 0.6
},
{
"category": [
"ICS"
],
"sub_category": null,
"trust": 0.4
}
],
"sources": [
{
"db": "IVD",
"id": "7d7e3d5e-463f-11e9-bcc2-000c29342cb1"
},
{
"db": "IVD",
"id": "8fa72c7e-1fad-11e6-abef-000c29c66e3d"
},
{
"db": "CNVD",
"id": "CNVD-2010-2238"
}
]
},
"last_update_date": "2022-05-17T02:07:22.181000Z",
"references": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/references#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"trust": 0.6,
"url": "http://www.securityfocus.com/archive/1/514104"
},
{
"trust": 0.3,
"url": "http://www.intellicom.se/webscada.cfm"
},
{
"trust": 0.3,
"url": "/archive/1/514104"
}
],
"sources": [
{
"db": "CNVD",
"id": "CNVD-2010-2238"
},
{
"db": "BID",
"id": "43636"
}
]
},
"sources": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#",
"data": {
"@container": "@list"
}
},
"data": [
{
"db": "IVD",
"id": "7d7e3d5e-463f-11e9-bcc2-000c29342cb1"
},
{
"db": "IVD",
"id": "8fa72c7e-1fad-11e6-abef-000c29c66e3d"
},
{
"db": "CNVD",
"id": "CNVD-2010-2238"
},
{
"db": "BID",
"id": "43636"
}
]
},
"sources_release_date": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources_release_date#",
"data": {
"@container": "@list"
}
},
"data": [
{
"date": "2010-10-03T00:00:00",
"db": "IVD",
"id": "7d7e3d5e-463f-11e9-bcc2-000c29342cb1"
},
{
"date": "2010-10-03T00:00:00",
"db": "IVD",
"id": "8fa72c7e-1fad-11e6-abef-000c29c66e3d"
},
{
"date": "2010-10-03T00:00:00",
"db": "CNVD",
"id": "CNVD-2010-2238"
},
{
"date": "2010-10-01T00:00:00",
"db": "BID",
"id": "43636"
}
]
},
"sources_update_date": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources_update_date#",
"data": {
"@container": "@list"
}
},
"data": [
{
"date": "2010-10-03T00:00:00",
"db": "CNVD",
"id": "CNVD-2010-2238"
},
{
"date": "2010-10-01T00:00:00",
"db": "BID",
"id": "43636"
}
]
},
"threat_type": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/threat_type#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "network",
"sources": [
{
"db": "BID",
"id": "43636"
}
],
"trust": 0.3
},
"title": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/title#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "Intellicom Netbiter webSCADA product \u0027read.cgi\u0027 multiple security vulnerabilities",
"sources": [
{
"db": "CNVD",
"id": "CNVD-2010-2238"
}
],
"trust": 0.6
},
"type": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/type#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "Unknown",
"sources": [
{
"db": "BID",
"id": "43636"
}
],
"trust": 0.3
}
}
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.