Multiple vulnerabilities in Huawei GaussDB 200



Published: 2020-01-20 | Updated: 2020-01-24
Risk High
Patch available YES
Number of vulnerabilities 3
CVE-ID CVE-2020-1853
CVE-2020-1811
CVE-2020-1790
CWE-ID CWE-22
CWE-77
CWE-78
Exploitation vector Network
Public exploit N/A
Vulnerable software
Subscribe
Huawei GaussDB 200
Server applications / Database software

Vendor Huawei

Security Bulletin

This security bulletin contains information about 3 vulnerabilities.

Updated 24.01.2020
Added vulnerability #3

1) Path traversal

EUVDB-ID: #VU24396

Risk: Medium

CVSSv3.1: 5.7 [CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C]

CVE-ID: CVE-2020-1853

CWE-ID: CWE-22 - Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')

Exploit availability: No

Description

The vulnerability allows a remote attacker to perform directory traversal attacks.

The vulnerability exists due to input validation error when processing directory traversal sequences. A remote authenticated attacker can traverse directories and download files to a specific directory and read arbitrary files on the system.

Mitigation

Install update from vendor's website.

Vulnerable software versions

Huawei GaussDB 200: 6.5.1

External links

http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20200120-01-path-en


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote authenticated user via the Internet.

How the attacker can exploit this vulnerability?

The attacker would have to send a specially crafted request to the affected application in order to exploit this vulnerability.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

2) Command Injection

EUVDB-ID: #VU24397

Risk: High

CVSSv3.1: 7.7 [CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C]

CVE-ID: CVE-2020-1811

CWE-ID: CWE-77 - Command injection

Exploit availability: No

Description

The vulnerability allows a remote user to execute arbitrary commands on the target system.

The vulnerability exists due to insufficient input validation. A remote authenticated attacker can send a specially crafted request and execute arbitrary commands on the target system.

Mitigation

Install updates from vendor's website.

Vulnerable software versions

Huawei GaussDB 200: 6.5.1

External links

http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20200120-01-gaussdb200-en


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote authenticated user via the Internet.

How the attacker can exploit this vulnerability?

The attacker would have to send a specially crafted request to the affected application in order to exploit this vulnerability.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

3) OS Command Injection

EUVDB-ID: #VU24512

Risk: High

CVSSv3.1: 7.7 [CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C]

CVE-ID: CVE-2020-1790

CWE-ID: CWE-78 - Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')

Exploit availability: No

Description

The vulnerability allows a remote user to execute arbitrary shell commands on the target system.

The vulnerability exists due to insufficient validation of user-supplied input. A remote user can execute arbitrary OS commands on the target system.

Successful exploitation of this vulnerability may result in complete compromise of vulnerable system.

Mitigation

Install updates from vendor's website.

Vulnerable software versions

Huawei GaussDB 200: 6.5.1

External links

http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20200122-01-gauss-en


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote authenticated user via the Internet.

How the attacker can exploit this vulnerability?

The attacker would have to send a specially crafted request to the affected application in order to exploit this vulnerability.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.



###SIDEBAR###