VAR-201308-0129
Vulnerability from variot - Updated: 2025-04-11 23:18ping.php in Global Console Manager 16 (GCM16) and Global Console Manager 32 (GCM32) before 1.20.0.22575 on the IBM Avocent 1754 KVM switch allows remote authenticated users to execute arbitrary commands via shell metacharacters in the (1) count or (2) size parameter. The IBM 1754 GCM Series provides KVM and serial console management over IP in a single device. An attacker can exploit the vulnerability to execute arbitrary commands with root privileges. This vulnerability stems from a webapp variable not being properly filtered. The product supports AES encryption, LDAP and smart card/common access card (CAC) readers and more, enabling centralized authentication and local or remote system access
Show details on source website{
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#",
"affected_products": {
"@id": "https://www.variotdbs.pl/ref/affected_products"
},
"configurations": {
"@id": "https://www.variotdbs.pl/ref/configurations"
},
"credits": {
"@id": "https://www.variotdbs.pl/ref/credits"
},
"cvss": {
"@id": "https://www.variotdbs.pl/ref/cvss/"
},
"description": {
"@id": "https://www.variotdbs.pl/ref/description/"
},
"exploit_availability": {
"@id": "https://www.variotdbs.pl/ref/exploit_availability/"
},
"external_ids": {
"@id": "https://www.variotdbs.pl/ref/external_ids/"
},
"iot": {
"@id": "https://www.variotdbs.pl/ref/iot/"
},
"iot_taxonomy": {
"@id": "https://www.variotdbs.pl/ref/iot_taxonomy/"
},
"patch": {
"@id": "https://www.variotdbs.pl/ref/patch/"
},
"problemtype_data": {
"@id": "https://www.variotdbs.pl/ref/problemtype_data/"
},
"references": {
"@id": "https://www.variotdbs.pl/ref/references/"
},
"sources": {
"@id": "https://www.variotdbs.pl/ref/sources/"
},
"sources_release_date": {
"@id": "https://www.variotdbs.pl/ref/sources_release_date/"
},
"sources_update_date": {
"@id": "https://www.variotdbs.pl/ref/sources_update_date/"
},
"threat_type": {
"@id": "https://www.variotdbs.pl/ref/threat_type/"
},
"title": {
"@id": "https://www.variotdbs.pl/ref/title/"
},
"type": {
"@id": "https://www.variotdbs.pl/ref/type/"
}
},
"@id": "https://www.variotdbs.pl/vuln/VAR-201308-0129",
"affected_products": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/affected_products#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
},
"@id": "https://www.variotdbs.pl/ref/sources"
}
},
"data": [
{
"model": "global console manager 16",
"scope": "lte",
"trust": 1.0,
"vendor": "ibm",
"version": "1.18.0.22011"
},
{
"model": "global console manager 32",
"scope": "lte",
"trust": 1.0,
"vendor": "ibm",
"version": "1.18.0.22011"
},
{
"model": "1754 gcm16 global console manager",
"scope": "lt",
"trust": 0.8,
"vendor": "ibm",
"version": "1.20.0.22575"
},
{
"model": "1754 gcm32 global console manager",
"scope": "lt",
"trust": 0.8,
"vendor": "ibm",
"version": "1.20.0.22575"
},
{
"model": "avocent",
"scope": "eq",
"trust": 0.8,
"vendor": "ibm",
"version": "1754 kvm"
},
{
"model": "gcm16 global console manager",
"scope": "eq",
"trust": 0.6,
"vendor": "ibm",
"version": "1754\u003c=1.18.0.22011"
},
{
"model": "gcm32 global console manager",
"scope": "eq",
"trust": 0.6,
"vendor": "ibm",
"version": "1754\u003c=1.18.0.22011"
},
{
"model": "global console manager 16",
"scope": "eq",
"trust": 0.6,
"vendor": "ibm",
"version": "1.18.0.22011"
},
{
"model": "global console manager 32",
"scope": "eq",
"trust": 0.6,
"vendor": "ibm",
"version": "1.18.0.22011"
},
{
"model": "gcm32 global console manager",
"scope": "eq",
"trust": 0.3,
"vendor": "ibm",
"version": "17541.18.0.22011"
},
{
"model": "gcm16 global console manager",
"scope": "eq",
"trust": 0.3,
"vendor": "ibm",
"version": "17541.18.0.22011"
},
{
"model": "gcm32 global console manager",
"scope": "ne",
"trust": 0.3,
"vendor": "ibm",
"version": "17541.20.0.22575"
},
{
"model": "gcm16 global console manager",
"scope": "ne",
"trust": 0.3,
"vendor": "ibm",
"version": "17541.20.0.22575"
}
],
"sources": [
{
"db": "CNVD",
"id": "CNVD-2013-12510"
},
{
"db": "BID",
"id": "61816"
},
{
"db": "JVNDB",
"id": "JVNDB-2013-003841"
},
{
"db": "CNNVD",
"id": "CNNVD-201308-294"
},
{
"db": "NVD",
"id": "CVE-2013-0526"
}
]
},
"configurations": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/configurations#",
"children": {
"@container": "@list"
},
"cpe_match": {
"@container": "@list"
},
"data": {
"@container": "@list"
},
"nodes": {
"@container": "@list"
}
},
"data": [
{
"CVE_data_version": "4.0",
"nodes": [
{
"cpe_match": [
{
"cpe22Uri": "cpe:/o:ibm:global_console_manager_16_firmware",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/o:ibm:global_console_manager_32_firmware",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/h:ibm:avocent",
"vulnerable": true
}
],
"operator": "OR"
}
]
}
],
"sources": [
{
"db": "JVNDB",
"id": "JVNDB-2013-003841"
}
]
},
"credits": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/credits#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "Alejandro Alvarez Bravo",
"sources": [
{
"db": "BID",
"id": "61816"
},
{
"db": "CNNVD",
"id": "CNNVD-201308-294"
}
],
"trust": 0.9
},
"cve": "CVE-2013-0526",
"cvss": {
"@context": {
"cvssV2": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/cvssV2"
},
"cvssV3": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/"
},
"severity": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/cvss/severity#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/severity"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
},
"@id": "https://www.variotdbs.pl/ref/sources"
}
},
"data": [
{
"cvssV2": [
{
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "SINGLE",
"author": "nvd@nist.gov",
"availabilityImpact": "COMPLETE",
"baseScore": 8.5,
"confidentialityImpact": "COMPLETE",
"exploitabilityScore": 6.8,
"id": "CVE-2013-0526",
"impactScore": 10.0,
"integrityImpact": "COMPLETE",
"severity": "HIGH",
"trust": 1.8,
"vectorString": "AV:N/AC:M/Au:S/C:C/I:C/A:C",
"version": "2.0"
},
{
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "SINGLE",
"author": "CNVD",
"availabilityImpact": "COMPLETE",
"baseScore": 8.5,
"confidentialityImpact": "COMPLETE",
"exploitabilityScore": 6.8,
"id": "CNVD-2013-12510",
"impactScore": 10.0,
"integrityImpact": "COMPLETE",
"severity": "HIGH",
"trust": 0.6,
"vectorString": "AV:N/AC:M/Au:S/C:C/I:C/A:C",
"version": "2.0"
},
{
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "SINGLE",
"author": "VULHUB",
"availabilityImpact": "COMPLETE",
"baseScore": 8.5,
"confidentialityImpact": "COMPLETE",
"exploitabilityScore": 6.8,
"id": "VHN-60528",
"impactScore": 10.0,
"integrityImpact": "COMPLETE",
"severity": "HIGH",
"trust": 0.1,
"vectorString": "AV:N/AC:M/AU:S/C:C/I:C/A:C",
"version": "2.0"
}
],
"cvssV3": [],
"severity": [
{
"author": "nvd@nist.gov",
"id": "CVE-2013-0526",
"trust": 1.0,
"value": "HIGH"
},
{
"author": "NVD",
"id": "CVE-2013-0526",
"trust": 0.8,
"value": "High"
},
{
"author": "CNVD",
"id": "CNVD-2013-12510",
"trust": 0.6,
"value": "HIGH"
},
{
"author": "CNNVD",
"id": "CNNVD-201308-294",
"trust": 0.6,
"value": "HIGH"
},
{
"author": "VULHUB",
"id": "VHN-60528",
"trust": 0.1,
"value": "HIGH"
}
]
}
],
"sources": [
{
"db": "CNVD",
"id": "CNVD-2013-12510"
},
{
"db": "VULHUB",
"id": "VHN-60528"
},
{
"db": "JVNDB",
"id": "JVNDB-2013-003841"
},
{
"db": "CNNVD",
"id": "CNNVD-201308-294"
},
{
"db": "NVD",
"id": "CVE-2013-0526"
}
]
},
"description": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/description#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "ping.php in Global Console Manager 16 (GCM16) and Global Console Manager 32 (GCM32) before 1.20.0.22575 on the IBM Avocent 1754 KVM switch allows remote authenticated users to execute arbitrary commands via shell metacharacters in the (1) count or (2) size parameter. The IBM 1754 GCM Series provides KVM and serial console management over IP in a single device. An attacker can exploit the vulnerability to execute arbitrary commands with root privileges. This vulnerability stems from a webapp variable not being properly filtered. The product supports AES encryption, LDAP and smart card/common access card (CAC) readers and more, enabling centralized authentication and local or remote system access",
"sources": [
{
"db": "NVD",
"id": "CVE-2013-0526"
},
{
"db": "JVNDB",
"id": "JVNDB-2013-003841"
},
{
"db": "CNVD",
"id": "CNVD-2013-12510"
},
{
"db": "BID",
"id": "61816"
},
{
"db": "VULHUB",
"id": "VHN-60528"
}
],
"trust": 2.52
},
"exploit_availability": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/exploit_availability#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"reference": "https://www.scap.org.cn/vuln/vhn-60528",
"trust": 0.1,
"type": "unknown"
}
],
"sources": [
{
"db": "VULHUB",
"id": "VHN-60528"
}
]
},
"external_ids": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/external_ids#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"db": "NVD",
"id": "CVE-2013-0526",
"trust": 3.4
},
{
"db": "BID",
"id": "61816",
"trust": 1.6
},
{
"db": "JVNDB",
"id": "JVNDB-2013-003841",
"trust": 0.8
},
{
"db": "CNNVD",
"id": "CNNVD-201308-294",
"trust": 0.7
},
{
"db": "CNVD",
"id": "CNVD-2013-12510",
"trust": 0.6
},
{
"db": "XF",
"id": "85367",
"trust": 0.6
},
{
"db": "XF",
"id": "20130526",
"trust": 0.6
},
{
"db": "SEEBUG",
"id": "SSVID-81301",
"trust": 0.1
},
{
"db": "EXPLOIT-DB",
"id": "27706",
"trust": 0.1
},
{
"db": "PACKETSTORM",
"id": "122843",
"trust": 0.1
},
{
"db": "VULHUB",
"id": "VHN-60528",
"trust": 0.1
}
],
"sources": [
{
"db": "CNVD",
"id": "CNVD-2013-12510"
},
{
"db": "VULHUB",
"id": "VHN-60528"
},
{
"db": "BID",
"id": "61816"
},
{
"db": "JVNDB",
"id": "JVNDB-2013-003841"
},
{
"db": "CNNVD",
"id": "CNNVD-201308-294"
},
{
"db": "NVD",
"id": "CVE-2013-0526"
}
]
},
"id": "VAR-201308-0129",
"iot": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/iot#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": true,
"sources": [
{
"db": "CNVD",
"id": "CNVD-2013-12510"
},
{
"db": "VULHUB",
"id": "VHN-60528"
}
],
"trust": 1.3666667
},
"iot_taxonomy": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/iot_taxonomy#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"category": [
"Network device"
],
"sub_category": null,
"trust": 0.6
}
],
"sources": [
{
"db": "CNVD",
"id": "CNVD-2013-12510"
}
]
},
"last_update_date": "2025-04-11T23:18:53.879000Z",
"patch": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/patch#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"title": "IBM GCM16 KVM Switch Remote Command Execution (CVE-2013-0526)",
"trust": 0.8,
"url": "http://www.ibm.com/support/entry/portal/docdisplay?lndocid=MIGR-5093509"
},
{
"title": "Patches for multiple command execution vulnerabilities in IBM 1754 GCM16 and GCM32 Global Console Managers",
"trust": 0.6,
"url": "https://www.cnvd.org.cn/patchInfo/show/38278"
}
],
"sources": [
{
"db": "CNVD",
"id": "CNVD-2013-12510"
},
{
"db": "JVNDB",
"id": "JVNDB-2013-003841"
}
]
},
"problemtype_data": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/problemtype_data#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"problemtype": "CWE-20",
"trust": 1.1
}
],
"sources": [
{
"db": "VULHUB",
"id": "VHN-60528"
},
{
"db": "NVD",
"id": "CVE-2013-0526"
}
]
},
"references": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/references#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"trust": 1.7,
"url": "http://www.ibm.com/support/entry/portal/docdisplay?lndocid=migr-5093509"
},
{
"trust": 1.7,
"url": "http://www.bitcloud.es/2013/08/vulnerabilidad-en-kvms-gcm1632-de-ibm.html"
},
{
"trust": 1.1,
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/85367"
},
{
"trust": 0.9,
"url": "http://seclists.org/fulldisclosure/2013/aug/180"
},
{
"trust": 0.9,
"url": "http://www-947.ibm.com/support/entry/portal/docdisplay?lndocid=migr-5093509"
},
{
"trust": 0.8,
"url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2013-0526"
},
{
"trust": 0.8,
"url": "http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2013-0526"
},
{
"trust": 0.6,
"url": "http://xforce.iss.net/xforce/xfdb/85367"
},
{
"trust": 0.6,
"url": "http://www.securityfocus.com/bid/61816"
},
{
"trust": 0.3,
"url": "http://www.redbooks.ibm.com/abstracts/tips0772.html"
}
],
"sources": [
{
"db": "CNVD",
"id": "CNVD-2013-12510"
},
{
"db": "VULHUB",
"id": "VHN-60528"
},
{
"db": "BID",
"id": "61816"
},
{
"db": "JVNDB",
"id": "JVNDB-2013-003841"
},
{
"db": "CNNVD",
"id": "CNNVD-201308-294"
},
{
"db": "NVD",
"id": "CVE-2013-0526"
}
]
},
"sources": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#",
"data": {
"@container": "@list"
}
},
"data": [
{
"db": "CNVD",
"id": "CNVD-2013-12510"
},
{
"db": "VULHUB",
"id": "VHN-60528"
},
{
"db": "BID",
"id": "61816"
},
{
"db": "JVNDB",
"id": "JVNDB-2013-003841"
},
{
"db": "CNNVD",
"id": "CNNVD-201308-294"
},
{
"db": "NVD",
"id": "CVE-2013-0526"
}
]
},
"sources_release_date": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources_release_date#",
"data": {
"@container": "@list"
}
},
"data": [
{
"date": "2013-08-21T00:00:00",
"db": "CNVD",
"id": "CNVD-2013-12510"
},
{
"date": "2013-08-21T00:00:00",
"db": "VULHUB",
"id": "VHN-60528"
},
{
"date": "2013-08-16T00:00:00",
"db": "BID",
"id": "61816"
},
{
"date": "2013-08-23T00:00:00",
"db": "JVNDB",
"id": "JVNDB-2013-003841"
},
{
"date": "2013-08-29T00:00:00",
"db": "CNNVD",
"id": "CNNVD-201308-294"
},
{
"date": "2013-08-21T16:55:07.417000",
"db": "NVD",
"id": "CVE-2013-0526"
}
]
},
"sources_update_date": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources_update_date#",
"data": {
"@container": "@list"
}
},
"data": [
{
"date": "2013-08-22T00:00:00",
"db": "CNVD",
"id": "CNVD-2013-12510"
},
{
"date": "2017-08-29T00:00:00",
"db": "VULHUB",
"id": "VHN-60528"
},
{
"date": "2013-08-16T00:00:00",
"db": "BID",
"id": "61816"
},
{
"date": "2013-08-23T00:00:00",
"db": "JVNDB",
"id": "JVNDB-2013-003841"
},
{
"date": "2013-08-29T00:00:00",
"db": "CNNVD",
"id": "CNNVD-201308-294"
},
{
"date": "2025-04-11T00:51:21.963000",
"db": "NVD",
"id": "CVE-2013-0526"
}
]
},
"threat_type": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/threat_type#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "remote",
"sources": [
{
"db": "CNNVD",
"id": "CNNVD-201308-294"
}
],
"trust": 0.6
},
"title": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/title#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "IBM Avocent 1754 KVM Runs on the switch GCM16 and GCM32 Vulnerable to arbitrary command execution",
"sources": [
{
"db": "JVNDB",
"id": "JVNDB-2013-003841"
}
],
"trust": 0.8
},
"type": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/type#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "input validation",
"sources": [
{
"db": "CNNVD",
"id": "CNNVD-201308-294"
}
],
"trust": 0.6
}
}
Loading…
Loading…
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.
Loading…
Loading…