var-202004-0077
Vulnerability from variot
There are multiple ways an unauthenticated attacker could perform SQL injection on WebAccess/NMS (versions prior to 3.0.2) to gain access to sensitive information. This vulnerability allows remote attackers to disclose sensitive information on affected installations of Advantech WebAccess/NMS. Authentication is not required to exploit this vulnerability.The specific flaw exists within the processing of calls to the DeviceData/Performance endpoint. When parsing the mac parameter, the process does not properly validate a user-supplied string before using it to construct SQL queries. An attacker can leverage this vulnerability to disclose information in the context of SYSTEM. Advantech WebAccess/NMS is a set of Web browser-based Network Management System (NMS) software package developed by China Taiwan Advantech Corporation. There is a SQL injection vulnerability in Advantech WebAccess/NMS versions earlier than 3.0.2
Show details on source website{ affected_products: { _id: null, data: [ { _id: null, model: "webaccess/nms", scope: null, trust: 11.2, vendor: "advantech", version: null, }, { _id: null, model: "webaccess\\/nms", scope: "lt", trust: 1, vendor: "advantech", version: "3.0.2", }, ], sources: [ { db: "ZDI", id: "ZDI-20-438", }, { db: "ZDI", id: "ZDI-20-374", }, { db: "ZDI", id: "ZDI-20-412", }, { db: "ZDI", id: "ZDI-20-439", }, { db: "ZDI", id: "ZDI-20-395", }, { db: "ZDI", id: "ZDI-20-416", }, { db: "ZDI", id: "ZDI-20-409", }, { db: "ZDI", id: "ZDI-20-375", }, { db: "ZDI", id: "ZDI-20-424", }, { db: "ZDI", id: "ZDI-20-445", }, { db: "ZDI", id: "ZDI-20-419", }, { db: "ZDI", id: "ZDI-20-408", }, { db: "ZDI", id: "ZDI-20-435", }, { db: "ZDI", id: "ZDI-20-407", }, { db: "ZDI", id: "ZDI-20-417", }, { db: "ZDI", id: "ZDI-20-426", }, { db: "NVD", id: "CVE-2020-10617", }, ], }, credits: { _id: null, data: "rgod of 9sg", sources: [ { db: "ZDI", id: "ZDI-20-438", }, { db: "ZDI", id: "ZDI-20-374", }, { db: "ZDI", id: "ZDI-20-412", }, { db: "ZDI", id: "ZDI-20-439", }, { db: "ZDI", id: "ZDI-20-395", }, { db: "ZDI", id: "ZDI-20-416", }, { db: "ZDI", id: "ZDI-20-409", }, { db: "ZDI", id: "ZDI-20-375", }, { db: "ZDI", id: "ZDI-20-424", }, { db: "ZDI", id: "ZDI-20-445", }, { db: "ZDI", id: "ZDI-20-419", }, { db: "ZDI", id: "ZDI-20-408", }, { db: "ZDI", id: "ZDI-20-435", }, { db: "ZDI", id: "ZDI-20-407", }, { db: "ZDI", id: "ZDI-20-417", }, { db: "ZDI", id: "ZDI-20-426", }, ], trust: 11.2, }, cve: "CVE-2020-10617", cvss: { _id: null, data: [ { cvssV2: [ { accessComplexity: "LOW", accessVector: "NETWORK", authentication: "NONE", author: "nvd@nist.gov", availabilityImpact: "NONE", baseScore: 5, confidentialityImpact: "PARTIAL", exploitabilityScore: 10, id: "CVE-2020-10617", impactScore: 2.9, integrityImpact: "NONE", severity: "MEDIUM", trust: 1.1, vectorString: "AV:N/AC:L/Au:N/C:P/I:N/A:N", version: "2.0", }, { accessComplexity: "LOW", accessVector: "NETWORK", authentication: "NONE", author: "VULHUB", availabilityImpact: "NONE", baseScore: 5, confidentialityImpact: "PARTIAL", exploitabilityScore: 10, id: "VHN-163113", impactScore: 2.9, integrityImpact: "NONE", severity: "MEDIUM", trust: 0.1, vectorString: "AV:N/AC:L/AU:N/C:P/I:N/A:N", version: "2.0", }, ], cvssV3: [ { attackComplexity: "LOW", attackVector: "NETWORK", author: "ZDI", availabilityImpact: "NONE", baseScore: 7.5, baseSeverity: "HIGH", confidentialityImpact: "HIGH", exploitabilityScore: 3.9, id: "CVE-2020-10617", impactScore: 3.6, integrityImpact: "NONE", privilegesRequired: "NONE", scope: "UNCHANGED", trust: 11.2, userInteraction: "NONE", vectorString: "AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", version: "3.0", }, { attackComplexity: "LOW", attackVector: "NETWORK", author: "nvd@nist.gov", availabilityImpact: "NONE", baseScore: 7.5, baseSeverity: "HIGH", confidentialityImpact: "HIGH", exploitabilityScore: 3.9, id: "CVE-2020-10617", impactScore: 3.6, integrityImpact: "NONE", privilegesRequired: "NONE", scope: "UNCHANGED", trust: 1, userInteraction: "NONE", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", version: "3.1", }, ], severity: [ { author: "ZDI", id: "CVE-2020-10617", trust: 11.2, value: "HIGH", }, { author: "nvd@nist.gov", id: "CVE-2020-10617", trust: 1, value: "HIGH", }, { author: "VULHUB", id: "VHN-163113", trust: 0.1, value: "MEDIUM", }, { author: "VULMON", id: "CVE-2020-10617", trust: 0.1, value: "MEDIUM", }, ], }, ], sources: [ { db: "ZDI", id: "ZDI-20-438", }, { db: "ZDI", id: "ZDI-20-374", }, { db: "ZDI", id: "ZDI-20-412", }, { db: "ZDI", id: "ZDI-20-439", }, { db: "ZDI", id: "ZDI-20-395", }, { db: "ZDI", id: "ZDI-20-416", }, { db: "ZDI", id: "ZDI-20-409", }, { db: "ZDI", id: "ZDI-20-375", }, { db: "ZDI", id: "ZDI-20-424", }, { db: "ZDI", id: "ZDI-20-445", }, { db: "ZDI", id: "ZDI-20-419", }, { db: "ZDI", id: "ZDI-20-408", }, { db: "ZDI", id: "ZDI-20-435", }, { db: "ZDI", id: "ZDI-20-407", }, { db: "ZDI", id: "ZDI-20-417", }, { db: "ZDI", id: "ZDI-20-426", }, { db: "VULHUB", id: "VHN-163113", }, { db: "VULMON", id: "CVE-2020-10617", }, { db: "NVD", id: "CVE-2020-10617", }, ], }, description: { _id: null, data: "There are multiple ways an unauthenticated attacker could perform SQL injection on WebAccess/NMS (versions prior to 3.0.2) to gain access to sensitive information. This vulnerability allows remote attackers to disclose sensitive information on affected installations of Advantech WebAccess/NMS. Authentication is not required to exploit this vulnerability.The specific flaw exists within the processing of calls to the DeviceData/Performance endpoint. When parsing the mac parameter, the process does not properly validate a user-supplied string before using it to construct SQL queries. An attacker can leverage this vulnerability to disclose information in the context of SYSTEM. Advantech WebAccess/NMS is a set of Web browser-based Network Management System (NMS) software package developed by China Taiwan Advantech Corporation. There is a SQL injection vulnerability in Advantech WebAccess/NMS versions earlier than 3.0.2", sources: [ { db: "NVD", id: "CVE-2020-10617", }, { db: "ZDI", id: "ZDI-20-374", }, { db: "ZDI", id: "ZDI-20-426", }, { db: "ZDI", id: "ZDI-20-417", }, { db: "ZDI", id: "ZDI-20-407", }, { db: "ZDI", id: "ZDI-20-435", }, { db: "ZDI", id: "ZDI-20-408", }, { db: "ZDI", id: "ZDI-20-419", }, { db: "ZDI", id: "ZDI-20-438", }, { db: "ZDI", id: "ZDI-20-424", }, { db: "ZDI", id: "ZDI-20-375", }, { db: "ZDI", id: "ZDI-20-409", }, { db: "ZDI", id: "ZDI-20-416", }, { db: "ZDI", id: "ZDI-20-395", }, { db: "ZDI", id: "ZDI-20-439", }, { db: "ZDI", id: "ZDI-20-412", }, { db: "ZDI", id: "ZDI-20-445", }, { db: "VULHUB", id: "VHN-163113", }, { db: "VULMON", id: "CVE-2020-10617", }, ], trust: 11.16, }, external_ids: { _id: null, data: [ { db: "NVD", id: "CVE-2020-10617", trust: 12.4, }, { db: "ICS CERT", id: "ICSA-20-098-01", trust: 1.2, }, { db: "ZDI_CAN", id: "ZDI-CAN-9820", trust: 0.7, }, { db: "ZDI", id: "ZDI-20-438", trust: 0.7, }, { db: "ZDI_CAN", id: "ZDI-CAN-9567", trust: 0.7, }, { db: "ZDI", id: "ZDI-20-374", trust: 0.7, }, { db: "ZDI_CAN", id: "ZDI-CAN-9765", trust: 0.7, }, { db: "ZDI", id: "ZDI-20-412", trust: 0.7, }, { db: "ZDI_CAN", id: "ZDI-CAN-9821", trust: 0.7, }, { db: "ZDI", id: "ZDI-20-439", trust: 0.7, }, { db: "ZDI_CAN", id: "ZDI-CAN-9589", trust: 0.7, }, { db: "ZDI", id: "ZDI-20-395", trust: 0.7, }, { db: "ZDI_CAN", id: "ZDI-CAN-9776", trust: 0.7, }, { db: "ZDI", id: "ZDI-20-416", trust: 0.7, }, { db: "ZDI_CAN", id: "ZDI-CAN-9701", trust: 0.7, }, { db: "ZDI", id: "ZDI-20-409", trust: 0.7, }, { db: "ZDI_CAN", id: "ZDI-CAN-9568", trust: 0.7, }, { db: "ZDI", id: "ZDI-20-375", trust: 0.7, }, { db: "ZDI_CAN", id: "ZDI-CAN-9803", trust: 0.7, }, { db: "ZDI", id: "ZDI-20-424", trust: 0.7, }, { db: "ZDI_CAN", id: "ZDI-CAN-9827", trust: 0.7, }, { db: "ZDI", id: "ZDI-20-445", trust: 0.7, }, { db: "ZDI_CAN", id: "ZDI-CAN-9793", trust: 0.7, }, { db: "ZDI", id: "ZDI-20-419", trust: 0.7, }, { db: "ZDI_CAN", id: "ZDI-CAN-9700", trust: 0.7, }, { db: "ZDI", id: "ZDI-20-408", trust: 0.7, }, { db: "ZDI_CAN", id: "ZDI-CAN-9817", trust: 0.7, }, { db: "ZDI", id: "ZDI-20-435", trust: 0.7, }, { db: "ZDI_CAN", id: "ZDI-CAN-9699", trust: 0.7, }, { db: "ZDI", id: "ZDI-20-407", trust: 0.7, }, { db: "ZDI_CAN", id: "ZDI-CAN-9777", trust: 0.7, }, { db: "ZDI", id: "ZDI-20-417", trust: 0.7, }, { db: "ZDI_CAN", id: "ZDI-CAN-9805", trust: 0.7, }, { db: "ZDI", id: "ZDI-20-426", trust: 0.7, }, { db: "CNVD", id: "CNVD-2020-22316", trust: 0.1, }, { db: "CNNVD", id: "CNNVD-202004-397", trust: 0.1, }, { db: "VULHUB", id: "VHN-163113", trust: 0.1, }, { db: "VULMON", id: "CVE-2020-10617", trust: 0.1, }, ], sources: [ { db: "ZDI", id: "ZDI-20-438", }, { db: "ZDI", id: "ZDI-20-374", }, { db: "ZDI", id: "ZDI-20-412", }, { db: "ZDI", id: "ZDI-20-439", }, { db: "ZDI", id: "ZDI-20-395", }, { db: "ZDI", id: "ZDI-20-416", }, { db: "ZDI", id: "ZDI-20-409", }, { db: "ZDI", id: "ZDI-20-375", }, { db: "ZDI", id: "ZDI-20-424", }, { db: "ZDI", id: "ZDI-20-445", }, { db: "ZDI", id: "ZDI-20-419", }, { db: "ZDI", id: "ZDI-20-408", }, { db: "ZDI", id: "ZDI-20-435", }, { db: "ZDI", id: "ZDI-20-407", }, { db: "ZDI", id: "ZDI-20-417", }, { db: "ZDI", id: "ZDI-20-426", }, { db: "VULHUB", id: "VHN-163113", }, { db: "VULMON", id: "CVE-2020-10617", }, { db: "NVD", id: "CVE-2020-10617", }, ], }, id: "VAR-202004-0077", iot: { _id: null, data: true, sources: [ { db: "VULHUB", id: "VHN-163113", }, ], trust: 0.636888, }, last_update_date: "2024-11-29T22:49:10.471000Z", patch: { _id: null, data: [ { title: "Advantech has issued an update to correct this vulnerability.", trust: 11.2, url: "https://www.us-cert.gov/ics/advisories/icsa-20-098-01", }, ], sources: [ { db: "ZDI", id: "ZDI-20-438", }, { db: "ZDI", id: "ZDI-20-374", }, { db: "ZDI", id: "ZDI-20-412", }, { db: "ZDI", id: "ZDI-20-439", }, { db: "ZDI", id: "ZDI-20-395", }, { db: "ZDI", id: "ZDI-20-416", }, { db: "ZDI", id: "ZDI-20-409", }, { db: "ZDI", id: "ZDI-20-375", }, { db: "ZDI", id: "ZDI-20-424", }, { db: "ZDI", id: "ZDI-20-445", }, { db: "ZDI", id: "ZDI-20-419", }, { db: "ZDI", id: "ZDI-20-408", }, { db: "ZDI", id: "ZDI-20-435", }, { db: "ZDI", id: "ZDI-20-407", }, { db: "ZDI", id: "ZDI-20-417", }, { db: "ZDI", id: "ZDI-20-426", }, ], }, problemtype_data: { _id: null, data: [ { problemtype: "CWE-89", trust: 1.1, }, ], sources: [ { db: "VULHUB", id: "VHN-163113", }, { db: "NVD", id: "CVE-2020-10617", }, ], }, references: { _id: null, data: [ { trust: 12.4, url: "https://www.us-cert.gov/ics/advisories/icsa-20-098-01", }, { trust: 0.1, url: "https://cwe.mitre.org/data/definitions/89.html", }, { trust: 0.1, url: "https://nvd.nist.gov", }, ], sources: [ { db: "ZDI", id: "ZDI-20-438", }, { db: "ZDI", id: "ZDI-20-374", }, { db: "ZDI", id: "ZDI-20-412", }, { db: "ZDI", id: "ZDI-20-439", }, { db: "ZDI", id: "ZDI-20-395", }, { db: "ZDI", id: "ZDI-20-416", }, { db: "ZDI", id: "ZDI-20-409", }, { db: "ZDI", id: "ZDI-20-375", }, { db: "ZDI", id: "ZDI-20-424", }, { db: "ZDI", id: "ZDI-20-445", }, { db: "ZDI", id: "ZDI-20-419", }, { db: "ZDI", id: "ZDI-20-408", }, { db: "ZDI", id: "ZDI-20-435", }, { db: "ZDI", id: "ZDI-20-407", }, { db: "ZDI", id: "ZDI-20-417", }, { db: "ZDI", id: "ZDI-20-426", }, { db: "VULHUB", id: "VHN-163113", }, { db: "VULMON", id: "CVE-2020-10617", }, { db: "NVD", id: "CVE-2020-10617", }, ], }, sources: { _id: null, data: [ { db: "ZDI", id: "ZDI-20-438", ident: null, }, { db: "ZDI", id: "ZDI-20-374", ident: null, }, { db: "ZDI", id: "ZDI-20-412", ident: null, }, { db: "ZDI", id: "ZDI-20-439", ident: null, }, { db: "ZDI", id: "ZDI-20-395", ident: null, }, { db: "ZDI", id: "ZDI-20-416", ident: null, }, { db: "ZDI", id: "ZDI-20-409", ident: null, }, { db: "ZDI", id: "ZDI-20-375", ident: null, }, { db: "ZDI", id: "ZDI-20-424", ident: null, }, { db: "ZDI", id: "ZDI-20-445", ident: null, }, { db: "ZDI", id: "ZDI-20-419", ident: null, }, { db: "ZDI", id: "ZDI-20-408", ident: null, }, { db: "ZDI", id: "ZDI-20-435", ident: null, }, { db: "ZDI", id: "ZDI-20-407", ident: null, }, { db: "ZDI", id: "ZDI-20-417", ident: null, }, { db: "ZDI", id: "ZDI-20-426", ident: null, }, { db: "VULHUB", id: "VHN-163113", ident: null, }, { db: "VULMON", id: "CVE-2020-10617", ident: null, }, { db: "NVD", id: "CVE-2020-10617", ident: null, }, ], }, sources_release_date: { _id: null, data: [ { date: "2020-04-08T00:00:00", db: "ZDI", id: "ZDI-20-438", ident: null, }, { date: "2020-04-08T00:00:00", db: "ZDI", id: "ZDI-20-374", ident: null, }, { date: "2020-04-08T00:00:00", db: "ZDI", id: "ZDI-20-412", ident: null, }, { date: "2020-04-08T00:00:00", db: "ZDI", id: "ZDI-20-439", ident: null, }, { date: "2020-04-08T00:00:00", db: "ZDI", id: "ZDI-20-395", ident: null, }, { date: "2020-04-08T00:00:00", db: "ZDI", id: "ZDI-20-416", ident: null, }, { date: "2020-04-08T00:00:00", db: "ZDI", id: "ZDI-20-409", ident: null, }, { date: "2020-04-08T00:00:00", db: "ZDI", id: "ZDI-20-375", ident: null, }, { date: "2020-04-08T00:00:00", db: "ZDI", id: "ZDI-20-424", ident: null, }, { date: "2020-04-08T00:00:00", db: "ZDI", id: "ZDI-20-445", ident: null, }, { date: "2020-04-08T00:00:00", db: "ZDI", id: "ZDI-20-419", ident: null, }, { date: "2020-04-08T00:00:00", db: "ZDI", id: "ZDI-20-408", ident: null, }, { date: "2020-04-08T00:00:00", db: "ZDI", id: "ZDI-20-435", ident: null, }, { date: "2020-04-08T00:00:00", db: "ZDI", id: "ZDI-20-407", ident: null, }, { date: "2020-04-08T00:00:00", db: "ZDI", id: "ZDI-20-417", ident: null, }, { date: "2020-04-08T00:00:00", db: "ZDI", id: "ZDI-20-426", ident: null, }, { date: "2020-04-09T00:00:00", db: "VULHUB", id: "VHN-163113", ident: null, }, { date: "2020-04-09T00:00:00", db: "VULMON", id: "CVE-2020-10617", ident: null, }, { date: "2020-04-09T14:15:12.510000", db: "NVD", id: "CVE-2020-10617", ident: null, }, ], }, sources_update_date: { _id: null, data: [ { date: "2020-04-08T00:00:00", db: "ZDI", id: "ZDI-20-438", ident: null, }, { date: "2020-04-08T00:00:00", db: "ZDI", id: "ZDI-20-374", ident: null, }, { date: "2020-04-08T00:00:00", db: "ZDI", id: "ZDI-20-412", ident: null, }, { date: "2020-04-08T00:00:00", db: "ZDI", id: "ZDI-20-439", ident: null, }, { date: "2020-04-08T00:00:00", db: "ZDI", id: "ZDI-20-395", ident: null, }, { date: "2020-04-08T00:00:00", db: "ZDI", id: "ZDI-20-416", ident: null, }, { date: "2020-04-08T00:00:00", db: "ZDI", id: "ZDI-20-409", ident: null, }, { date: "2020-04-08T00:00:00", db: "ZDI", id: "ZDI-20-375", ident: null, }, { date: "2020-04-08T00:00:00", db: "ZDI", id: "ZDI-20-424", ident: null, }, { date: "2020-04-08T00:00:00", db: "ZDI", id: "ZDI-20-445", ident: null, }, { date: "2020-04-08T00:00:00", db: "ZDI", id: "ZDI-20-419", ident: null, }, { date: "2020-04-08T00:00:00", db: "ZDI", id: "ZDI-20-408", ident: null, }, { date: "2020-04-08T00:00:00", db: "ZDI", id: "ZDI-20-435", ident: null, }, { date: "2020-04-08T00:00:00", db: "ZDI", id: "ZDI-20-407", ident: null, }, { date: "2020-04-08T00:00:00", db: "ZDI", id: "ZDI-20-417", ident: null, }, { date: "2020-04-08T00:00:00", db: "ZDI", id: "ZDI-20-426", ident: null, }, { date: "2020-04-09T00:00:00", db: "VULHUB", id: "VHN-163113", ident: null, }, { date: "2020-04-09T00:00:00", db: "VULMON", id: "CVE-2020-10617", ident: null, }, { date: "2024-11-21T04:55:42.477000", db: "NVD", id: "CVE-2020-10617", ident: null, }, ], }, title: { _id: null, data: "Advantech WebAccess/NMS DBUtil SQL Injection Information Disclosure Vulnerability", sources: [ { db: "ZDI", id: "ZDI-20-438", }, { db: "ZDI", id: "ZDI-20-439", }, { db: "ZDI", id: "ZDI-20-395", }, { db: "ZDI", id: "ZDI-20-416", }, { db: "ZDI", id: "ZDI-20-424", }, { db: "ZDI", id: "ZDI-20-419", }, { db: "ZDI", id: "ZDI-20-408", }, { db: "ZDI", id: "ZDI-20-435", }, { db: "ZDI", id: "ZDI-20-407", }, { db: "ZDI", id: "ZDI-20-417", }, { db: "ZDI", id: "ZDI-20-426", }, ], trust: 7.7, }, }
Log in or create an account to share your comment.
This schema specifies the format of a comment related to a security advisory.
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.