SB2022042906 - Multiple vulnerabilities in Delta Industrial Services DRAS



SB2022042906 - Multiple vulnerabilities in Delta Industrial Services DRAS

Published: April 29, 2022

Security Bulletin ID SB2022042906
CSH Severity
Medium
Patch available
NO
Number of vulnerabilities 3
Exploitation vector Remote access
Highest impact Information disclosure

Breakdown by Severity

Medium 100%
  • Low
  • Medium
  • High
  • Critical

Description

This security bulletin contains information about 3 vulnerabilities.


1) XML External Entity injection (CVE-ID: N/A)

The vulnerability allows a remote attacker to gain access to sensitive information.

The vulnerability exists due to insufficient validation of user-supplied XML input within the handling of DRAS files. A remote attacker can trick a victim to open a specially crafted file and view contents of arbitrary files on the system or initiate requests to external systems.

Successful exploitation of the vulnerability may allow an attacker to view contents of arbitrary file on the server or perform network scanning of internal and external infrastructure.


2) XML External Entity injection (CVE-ID: N/A)

The vulnerability allows a remote attacker to gain access to sensitive information.

The vulnerability exists due to insufficient validation of user-supplied XML input within the handling of DSCP files. A remote attacker can trick a victim to open a specially crafted file and view contents of arbitrary files on the system or initiate requests to external systems.

Successful exploitation of the vulnerability may allow an attacker to view contents of arbitrary file on the server or perform network scanning of internal and external infrastructure.


3) XML External Entity injection (CVE-ID: N/A)

The vulnerability allows a remote attacker to gain access to sensitive information.

The vulnerability exists due to insufficient validation of user-supplied XML input within Point Table processing. A remote attacker can trick a victim to open a specially crafted file and view contents of arbitrary files on the system or initiate requests to external systems.

Successful exploitation of the vulnerability may allow an attacker to view contents of arbitrary file on the server or perform network scanning of internal and external infrastructure.


Remediation

Cybersecurity Help is not aware of any official remediation provided by the vendor.