VAR-201511-0264

Vulnerability from variot - Updated: 2025-04-13 23:23

The administration-panel web service in IBM System Networking Switch Center (SNSC) before 7.3.1.5 and Lenovo Switch Center before 8.1.2.0 allows local users to execute arbitrary JSP code with SYSTEM privileges by using the Apache Axis AdminService deployment method to install a .jsp file. Authentication is not required to exploit this vulnerability.The specific flaw exists within the IBM SNSC Web Service, which listens by default on ports 40080 (HTTP) or 40443 (HTTPS) for requests to the administration panel. An attacker can leverage this access to install arbitrary .jsp files on the server, which will by default run under the context of SYSTEM. A local attacker can exploit this vulnerability to gain elevated privileges. The following products are affected: IBM System Networking Switch Center 7.1.3.4 and prior Lenovo Switch Center 8.1.1.0 and prior

Show details on source website

{
  "affected_products": {
    "_id": null,
    "data": [
      {
        "_id": null,
        "model": "system networking switch center",
        "scope": "lte",
        "trust": 1.0,
        "vendor": "ibm",
        "version": "7.3.1.4"
      },
      {
        "_id": null,
        "model": "switch center",
        "scope": "lte",
        "trust": 1.0,
        "vendor": "lenovo",
        "version": "8.1.1.0"
      },
      {
        "_id": null,
        "model": "switch center",
        "scope": "eq",
        "trust": 0.9,
        "vendor": "lenovo",
        "version": "8.1.1.0"
      },
      {
        "_id": null,
        "model": "system networking switch center",
        "scope": "lt",
        "trust": 0.8,
        "vendor": "ibm",
        "version": "7.3.1.5"
      },
      {
        "_id": null,
        "model": "switch center",
        "scope": "lt",
        "trust": 0.8,
        "vendor": "lenovo",
        "version": "8.1.2.0"
      },
      {
        "_id": null,
        "model": "system networking switch center",
        "scope": null,
        "trust": 0.7,
        "vendor": "ibm",
        "version": null
      },
      {
        "_id": null,
        "model": "system networking switch center",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "7.3.11"
      },
      {
        "_id": null,
        "model": "system networking switch center",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "7.2.111"
      },
      {
        "_id": null,
        "model": "system networking switch center",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "7.2.110"
      },
      {
        "_id": null,
        "model": "system networking switch center",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "7.1.32"
      },
      {
        "_id": null,
        "model": "system networking switch center",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "7.1.31"
      },
      {
        "_id": null,
        "model": "system networking switch center",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "7.3.1.2"
      },
      {
        "_id": null,
        "model": "system networking switch center",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "7.1.3.4"
      },
      {
        "_id": null,
        "model": "system networking switch center",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "7.1.3.0"
      },
      {
        "_id": null,
        "model": "system networking switch center",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "7.1.2.0"
      },
      {
        "_id": null,
        "model": "system networking switch center",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "7.1.1.0"
      },
      {
        "_id": null,
        "model": "system networking switch center",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "7.1"
      },
      {
        "_id": null,
        "model": "switch center",
        "scope": "ne",
        "trust": 0.3,
        "vendor": "lenovo",
        "version": "8.1.2.0"
      },
      {
        "_id": null,
        "model": "system networking switch center",
        "scope": "ne",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "7.3.1.5"
      }
    ],
    "sources": [
      {
        "db": "ZDI",
        "id": "ZDI-15-551"
      },
      {
        "db": "BID",
        "id": "77548"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2015-005919"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201511-168"
      },
      {
        "db": "NVD",
        "id": "CVE-2015-7818"
      }
    ]
  },
  "configurations": {
    "_id": null,
    "data": [
      {
        "CVE_data_version": "4.0",
        "nodes": [
          {
            "cpe_match": [
              {
                "cpe22Uri": "cpe:/a:ibm:system_networking_switch_center",
                "vulnerable": true
              },
              {
                "cpe22Uri": "cpe:/a:lenovo:switch_center",
                "vulnerable": true
              }
            ],
            "operator": "OR"
          }
        ]
      }
    ],
    "sources": [
      {
        "db": "JVNDB",
        "id": "JVNDB-2015-005919"
      }
    ]
  },
  "credits": {
    "_id": null,
    "data": "rgod",
    "sources": [
      {
        "db": "ZDI",
        "id": "ZDI-15-551"
      },
      {
        "db": "BID",
        "id": "77548"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201511-168"
      }
    ],
    "trust": 1.6
  },
  "cve": "CVE-2015-7818",
  "cvss": {
    "_id": null,
    "data": [
      {
        "cvssV2": [
          {
            "accessComplexity": "LOW",
            "accessVector": "LOCAL",
            "authentication": "NONE",
            "author": "nvd@nist.gov",
            "availabilityImpact": "COMPLETE",
            "baseScore": 7.2,
            "confidentialityImpact": "COMPLETE",
            "exploitabilityScore": 3.9,
            "id": "CVE-2015-7818",
            "impactScore": 10.0,
            "integrityImpact": "COMPLETE",
            "severity": "HIGH",
            "trust": 2.5,
            "vectorString": "AV:L/AC:L/Au:N/C:C/I:C/A:C",
            "version": "2.0"
          },
          {
            "accessComplexity": "LOW",
            "accessVector": "LOCAL",
            "authentication": "NONE",
            "author": "VULHUB",
            "availabilityImpact": "COMPLETE",
            "baseScore": 7.2,
            "confidentialityImpact": "COMPLETE",
            "exploitabilityScore": 3.9,
            "id": "VHN-85779",
            "impactScore": 10.0,
            "integrityImpact": "COMPLETE",
            "severity": "HIGH",
            "trust": 0.1,
            "vectorString": "AV:L/AC:L/AU:N/C:C/I:C/A:C",
            "version": "2.0"
          }
        ],
        "cvssV3": [],
        "severity": [
          {
            "author": "nvd@nist.gov",
            "id": "CVE-2015-7818",
            "trust": 1.0,
            "value": "HIGH"
          },
          {
            "author": "NVD",
            "id": "CVE-2015-7818",
            "trust": 0.8,
            "value": "High"
          },
          {
            "author": "ZDI",
            "id": "CVE-2015-7818",
            "trust": 0.7,
            "value": "HIGH"
          },
          {
            "author": "CNNVD",
            "id": "CNNVD-201511-168",
            "trust": 0.6,
            "value": "HIGH"
          },
          {
            "author": "VULHUB",
            "id": "VHN-85779",
            "trust": 0.1,
            "value": "HIGH"
          }
        ]
      }
    ],
    "sources": [
      {
        "db": "ZDI",
        "id": "ZDI-15-551"
      },
      {
        "db": "VULHUB",
        "id": "VHN-85779"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2015-005919"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201511-168"
      },
      {
        "db": "NVD",
        "id": "CVE-2015-7818"
      }
    ]
  },
  "description": {
    "_id": null,
    "data": "The administration-panel web service in IBM System Networking Switch Center (SNSC) before 7.3.1.5 and Lenovo Switch Center before 8.1.2.0 allows local users to execute arbitrary JSP code with SYSTEM privileges by using the Apache Axis AdminService deployment method to install a .jsp file. Authentication is not required to exploit this vulnerability.The specific flaw exists within the IBM SNSC Web Service, which listens by default on ports 40080 (HTTP) or 40443 (HTTPS) for requests to the administration panel. An attacker can leverage this access to install arbitrary .jsp files on the server, which will by default run under the context of SYSTEM. \nA local attacker can exploit this vulnerability to gain elevated privileges. \nThe following products are affected:\nIBM System Networking Switch Center 7.1.3.4 and prior\nLenovo Switch Center 8.1.1.0 and prior",
    "sources": [
      {
        "db": "NVD",
        "id": "CVE-2015-7818"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2015-005919"
      },
      {
        "db": "ZDI",
        "id": "ZDI-15-551"
      },
      {
        "db": "BID",
        "id": "77548"
      },
      {
        "db": "VULHUB",
        "id": "VHN-85779"
      }
    ],
    "trust": 2.61
  },
  "external_ids": {
    "_id": null,
    "data": [
      {
        "db": "NVD",
        "id": "CVE-2015-7818",
        "trust": 3.5
      },
      {
        "db": "ZDI",
        "id": "ZDI-15-551",
        "trust": 3.5
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2015-005919",
        "trust": 0.8
      },
      {
        "db": "ZDI_CAN",
        "id": "ZDI-CAN-3008",
        "trust": 0.7
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201511-168",
        "trust": 0.7
      },
      {
        "db": "BID",
        "id": "77548",
        "trust": 0.4
      },
      {
        "db": "SEEBUG",
        "id": "SSVID-89737",
        "trust": 0.1
      },
      {
        "db": "VULHUB",
        "id": "VHN-85779",
        "trust": 0.1
      }
    ],
    "sources": [
      {
        "db": "ZDI",
        "id": "ZDI-15-551"
      },
      {
        "db": "VULHUB",
        "id": "VHN-85779"
      },
      {
        "db": "BID",
        "id": "77548"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2015-005919"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201511-168"
      },
      {
        "db": "NVD",
        "id": "CVE-2015-7818"
      }
    ]
  },
  "id": "VAR-201511-0264",
  "iot": {
    "_id": null,
    "data": true,
    "sources": [
      {
        "db": "VULHUB",
        "id": "VHN-85779"
      }
    ],
    "trust": 0.01
  },
  "last_update_date": "2025-04-13T23:23:42.522000Z",
  "patch": {
    "_id": null,
    "data": [
      {
        "title": "LEN-2015-074",
        "trust": 0.8,
        "url": "https://support.lenovo.com/jp/ja/product_security/len_2015_074"
      },
      {
        "title": "IBM has issued an update to correct this vulnerability.",
        "trust": 0.7,
        "url": "https://support.lenovo.com/us/en/product_security/len_2015_074"
      },
      {
        "title": "Lenovo Switch Center Fixes for permission permissions and access control vulnerabilities",
        "trust": 0.6,
        "url": "http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=58662"
      }
    ],
    "sources": [
      {
        "db": "ZDI",
        "id": "ZDI-15-551"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2015-005919"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201511-168"
      }
    ]
  },
  "problemtype_data": {
    "_id": null,
    "data": [
      {
        "problemtype": "CWE-264",
        "trust": 1.9
      }
    ],
    "sources": [
      {
        "db": "VULHUB",
        "id": "VHN-85779"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2015-005919"
      },
      {
        "db": "NVD",
        "id": "CVE-2015-7818"
      }
    ]
  },
  "references": {
    "_id": null,
    "data": [
      {
        "trust": 2.8,
        "url": "http://www.zerodayinitiative.com/advisories/zdi-15-551/"
      },
      {
        "trust": 2.7,
        "url": "https://support.lenovo.com/us/en/product_security/len_2015_074"
      },
      {
        "trust": 0.8,
        "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2015-7818"
      },
      {
        "trust": 0.8,
        "url": "http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2015-7818"
      },
      {
        "trust": 0.3,
        "url": "http://www.ibm.com"
      }
    ],
    "sources": [
      {
        "db": "ZDI",
        "id": "ZDI-15-551"
      },
      {
        "db": "VULHUB",
        "id": "VHN-85779"
      },
      {
        "db": "BID",
        "id": "77548"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2015-005919"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201511-168"
      },
      {
        "db": "NVD",
        "id": "CVE-2015-7818"
      }
    ]
  },
  "sources": {
    "_id": null,
    "data": [
      {
        "db": "ZDI",
        "id": "ZDI-15-551",
        "ident": null
      },
      {
        "db": "VULHUB",
        "id": "VHN-85779",
        "ident": null
      },
      {
        "db": "BID",
        "id": "77548",
        "ident": null
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2015-005919",
        "ident": null
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201511-168",
        "ident": null
      },
      {
        "db": "NVD",
        "id": "CVE-2015-7818",
        "ident": null
      }
    ]
  },
  "sources_release_date": {
    "_id": null,
    "data": [
      {
        "date": "2015-11-10T00:00:00",
        "db": "ZDI",
        "id": "ZDI-15-551",
        "ident": null
      },
      {
        "date": "2015-11-12T00:00:00",
        "db": "VULHUB",
        "id": "VHN-85779",
        "ident": null
      },
      {
        "date": "2015-11-10T00:00:00",
        "db": "BID",
        "id": "77548",
        "ident": null
      },
      {
        "date": "2015-11-16T00:00:00",
        "db": "JVNDB",
        "id": "JVNDB-2015-005919",
        "ident": null
      },
      {
        "date": "2015-11-11T00:00:00",
        "db": "CNNVD",
        "id": "CNNVD-201511-168",
        "ident": null
      },
      {
        "date": "2015-11-12T03:59:06.500000",
        "db": "NVD",
        "id": "CVE-2015-7818",
        "ident": null
      }
    ]
  },
  "sources_update_date": {
    "_id": null,
    "data": [
      {
        "date": "2015-11-10T00:00:00",
        "db": "ZDI",
        "id": "ZDI-15-551",
        "ident": null
      },
      {
        "date": "2015-11-12T00:00:00",
        "db": "VULHUB",
        "id": "VHN-85779",
        "ident": null
      },
      {
        "date": "2015-11-10T00:00:00",
        "db": "BID",
        "id": "77548",
        "ident": null
      },
      {
        "date": "2015-11-16T00:00:00",
        "db": "JVNDB",
        "id": "JVNDB-2015-005919",
        "ident": null
      },
      {
        "date": "2015-11-13T00:00:00",
        "db": "CNNVD",
        "id": "CNNVD-201511-168",
        "ident": null
      },
      {
        "date": "2025-04-12T10:46:40.837000",
        "db": "NVD",
        "id": "CVE-2015-7818",
        "ident": null
      }
    ]
  },
  "threat_type": {
    "_id": null,
    "data": "local",
    "sources": [
      {
        "db": "BID",
        "id": "77548"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201511-168"
      }
    ],
    "trust": 0.9
  },
  "title": {
    "_id": null,
    "data": "IBM System Networking Switch Center and  Lenovo Switch Center In  SYSTEM Any at authority  JSP Code execution vulnerability",
    "sources": [
      {
        "db": "JVNDB",
        "id": "JVNDB-2015-005919"
      }
    ],
    "trust": 0.8
  },
  "type": {
    "_id": null,
    "data": "permissions and access control",
    "sources": [
      {
        "db": "CNNVD",
        "id": "CNNVD-201511-168"
      }
    ],
    "trust": 0.6
  }
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or observed by the user.
  • Confirmed: The vulnerability has been validated from an analyst's perspective.
  • Published Proof of Concept: A public proof of concept is available for this vulnerability.
  • Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
  • Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
  • Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
  • Not confirmed: The user expressed doubt about the validity of the vulnerability.
  • Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.


Loading…

Detection rules are retrieved from Rulezet.

Loading…

Loading…