Information disclosure in EMC Data Protection Advisor



Risk Low
Patch available YES
Number of vulnerabilities 2
CVE-ID CVE-2017-8002
CVE-2017-8003
CWE-ID CWE-89
CWE-22
Exploitation vector Network
Public exploit N/A
Vulnerable software
EMC Data Protection Advisor
Server applications / Other server solutions

Vendor Dell

Security Bulletin

This security bulletin contains information about 2 vulnerabilities.

1) SQL injection

EUVDB-ID: #VU7387

Risk: Low

CVSSv4.0: 4.9 [CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2017-8002

CWE-ID: CWE-89 - Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')

Exploit availability: No

Description

The vulnerability allows a remote authenticated attacker to execute SQL commands on the target system.

The weakness exists within the EMC DPA Application service, which listens on TCP port 9002 by default due to improper input validation. A remote attacker can supply a specially crafted parameter value to execute SQL commands on the underlying database and obtain information about the application.

Successful exploitation of the vulnerability results in information disclosure.

Mitigation

Update to version 6.4.

Vulnerable software versions

EMC Data Protection Advisor: 5.0 - 6.3

EMC Data Protection Advisor:

CPE2.3 External links

https://seclists.org/fulldisclosure/2017/Jul/12


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote authenticated user via the Internet.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

2) Path traversal

EUVDB-ID: #VU7388

Risk: Low

CVSSv4.0: 4.6 [CVSS:4.0/AV:N/AC:L/AT:N/PR:H/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2017-8003

CWE-ID: CWE-22 - Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')

Exploit availability: No

Description

The vulnerability allows a remote authenticated high privileged attacker to obtain potentially sensitive information.

The weakness exists due to improper input validation. A remote attacker can supply specially crafted stings in input parameters, trigger path traversal and read important information on the underlying operating system.

Successful exploitation of the vulnerability results in information disclosure.

Mitigation

Update to version 6.4.

Vulnerable software versions

EMC Data Protection Advisor: 5.0 - 6.3

CPE2.3 External links

https://seclists.org/fulldisclosure/2017/Jul/12


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote authenticated privileged user via the Internet.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.



###SIDEBAR###