Vulnerabilities > CVE-2012-2627 - Unspecified vulnerability in Sonicwall Scrutinizer 8.6.2/9.0.0/9.0.1

047910
CVSS 9.4 - CRITICAL
Attack vector
NETWORK
Attack complexity
LOW
Privileges required
NONE
Confidentiality impact
NONE
Integrity impact
COMPLETE
Availability impact
COMPLETE
network
low complexity
sonicwall
critical
nessus
exploit available

Summary

d4d/uploader.php in the web console in Plixer Scrutinizer (aka Dell SonicWALL Scrutinizer) before 9.5.0 allows remote attackers to create or overwrite arbitrary files in %PROGRAMFILES%\Scrutinizer\snmp\mibs\ via a multipart/form-data POST request.

Vulnerable Configurations

Part Description Count
Application
Sonicwall
9

Exploit-Db

descriptionScrutinizer 9.0.1.19899 Arbitrary File Upload Vulnerability. CVE-2012-2627. Webapps exploit for php platform
idEDB-ID:37548
last seen2016-02-04
modified2012-07-30
published2012-07-30
reporterMario Ceballos
sourcehttps://www.exploit-db.com/download/37548/
titleScrutinizer 9.0.1.19899 Arbitrary File Upload Vulnerability

Nessus

NASL familyCGI abuses
NASL idSCRUTINIZER_9_5_2.NASL
descriptionThe version of Scrutinizer running on the remote host is a version prior to 9.5.2, and is, therefore, potentially affected by the following vulnerabilities : - The
last seen2020-06-01
modified2020-06-02
plugin id61648
published2012-08-23
reporterThis script is Copyright (C) 2012-2019 and is owned by Tenable, Inc. or an Affiliate thereof.
sourcehttps://www.tenable.com/plugins/nessus/61648
titleScrutinizer < 9.5.2 Multiple Vulnerabilities
code
#
# (C) Tenable Network Security, Inc.
#

include("compat.inc");

if (description)
{
  script_id(61648);
  script_version("1.9");
  script_cvs_date("Date: 2019/12/04");

  script_cve_id("CVE-2012-2626", "CVE-2012-2627", "CVE-2012-3848");
  script_bugtraq_id(54725, 54726, 54727);

  script_name(english:"Scrutinizer < 9.5.2 Multiple Vulnerabilities");
  script_summary(english:"Checks version of Scrutinizer");

  script_set_attribute(attribute:"synopsis", value:
"The remote host is running a web application that is affected by
multiple vulnerabilities.");
  script_set_attribute(attribute:"description", value:
"The version of Scrutinizer running on the remote host is a version
prior to 9.5.2, and is, therefore, potentially affected by the following
vulnerabilities :

  - The 'd4d/exporters.php' and 'd4d/contextMenu.php' web 
    console scripts are affected by multiple cross-site 
    scripting vulnerabilities. (CVE-2012-3848)

  - An arbitrary file creation and file overwrite 
    vulnerability exists in the 'd4d/uploader.php' web 
    console script.  This allows attackers to create or 
    overwrite arbitrary files in
    '%PROGRAMFILES%\Scrutinizer\snmp\mibs\' via an HTTP POST 
    request. (CVE-2012-2627) 

  - The 'cgi-bin/admin.cgi' web console script allows remote,
    unauthenticated attackers to add administrative 
    accounts. (CVE-2012-2626)

Note that Tenable has confirmed the cross-site scripting vulnerabilities
in 9.5.0 even though that version was originally reported to have
addressed those.");
  script_set_attribute(attribute:"see_also", value:"https://www.trustwave.com/Resources/Security-Advisories/Advisories/TWSL2012-014/?fid=3792&dl=1");
  script_set_attribute(attribute:"solution", value:
"Upgrade to Scrutinizer 9.5.2 or later.");
  script_set_cvss_base_vector("CVSS2#AV:N/AC:L/Au:N/C:N/I:C/A:C");
  script_set_cvss_temporal_vector("CVSS2#E:POC/RL:OF/RC:C");

  script_set_attribute(attribute:"exploitability_ease", value:"No exploit is required");
  script_set_attribute(attribute:"exploit_available", value:"true");
  script_cwe_id(20, 74, 79, 442, 629, 711, 712, 722, 725, 750, 751, 800, 801, 809, 811, 864, 900, 928, 931, 990);

  script_set_attribute(attribute:"vuln_publication_date", value:"2012/07/27");
  script_set_attribute(attribute:"patch_publication_date", value:"2012/05/16");
  script_set_attribute(attribute:"plugin_publication_date", value:"2012/08/23");

  script_set_attribute(attribute:"plugin_type", value:"remote");
  script_set_attribute(attribute:"cpe", value:"cpe:/a:dell:sonicwall_scrutinizer");
  script_end_attributes();

  script_category(ACT_GATHER_INFO);
  script_family(english:"CGI abuses");

  script_copyright(english:"This script is Copyright (C) 2012-2019 and is owned by Tenable, Inc. or an Affiliate thereof.");

  script_dependencies("scrutinizer_detect.nasl");
  script_require_keys("www/scrutinizer_netflow_sflow_analyzer");
  script_exclude_keys("Settings/disable_cgi_scanning");
  script_require_ports("Services/www", 80);

  exit(0);
}

include("audit.inc");
include("global_settings.inc");
include("misc_func.inc");
include("http.inc");
include("webapp_func.inc");

port = get_http_port(default:80);

appname = 'Scrutinizer Netflow & sFlow Analyzer';
install = get_install_from_kb(appname:'scrutinizer_netflow_sflow_analyzer', port:port, exit_on_fail:TRUE);
dir = install['dir'];
app_url = build_url(qs:dir, port:port);

version = install['ver'];
if (version == UNKNOWN_VER) audit(AUDIT_UNKNOWN_WEB_APP_VER, appname, app_url);

fix = '9.5.2';
if (ver_compare(ver:version, fix:fix, strict:FALSE) == -1)
{
  set_kb_item(name:'www/'+port+'/XSS', value:TRUE);

  if (report_verbosity > 0)
  {
    report =
    '\n  URL               : ' + app_url + 
    '\n  Installed Version : ' + version +
    '\n  Fixed Version     : ' + fix + '\n';
    security_hole(port:port, extra:report);
  }
  else security_hole(port);
  exit(0);
}
else audit(AUDIT_WEB_APP_NOT_AFFECTED, appname, app_url, version);

Packetstorm

data sourcehttps://packetstormsecurity.com/files/download/115091/TWSL2012-014.txt
idPACKETSTORM:115091
last seen2016-12-05
published2012-07-29
reporterMario Ceballos
sourcehttps://packetstormsecurity.com/files/115091/Scrutinizer-NetFlow-sFlow-Analyzer-9.0.1-XSS-Bypass-File-Upload.html
titleScrutinizer NetFlow / sFlow Analyzer 9.0.1 XSS / Bypass / File Upload