SB2023081018 - Multiple vulnerabilities in Softing Secure Integration Server
Published: August 10, 2023
Breakdown by Severity
- Low
- Medium
- High
- Critical
Description
This security bulletin contains information about 6 secuirty vulnerabilities.
1) Use of Hard-coded Cryptographic Key (CVE-ID: CVE-2023-39482)
The vulnerability allows a remote user to gain access to potentially sensitive information.
The vulnerability exists due to the usage of a hard-coded cryptograhic key within libopcuaclient.so. A remote administrator can gain unauthorized access to sensitive information on the system.
2) Path traversal (CVE-ID: CVE-2023-29377)
The vulnerability allows a remote user to perform directory traversal attacks.
The vulnerability exists due to input validation error when processing directory traversal sequences. A remote administrator can send a specially crafted HTTP request and read arbitrary files on the system, leading to arbitrary code execution.
3) Exposure of Resource to Wrong Sphere (CVE-ID: CVE-2023-39478)
The vulnerability allows a remote user to compromise the system.
The vulnerability exists due to exposure of resource to wrong sphere within the handling of OPC FileDirectory namespaces. A remote administrator can execute arbitrary code in the context of root.
4) Path traversal (CVE-ID: CVE-2023-39479)
The vulnerability allows a remote user to perform directory traversal attacks.
The vulnerability exists due to input validation error when processing directory traversal sequences. A remote administrator can send a specially crafted HTTP request and create arbitrary files on the system, leading to arbitrary code execution.
5) Code Injection (CVE-ID: CVE-2023-39480)
The vulnerability allows a remote user to execute arbitrary code on the target system.
The vulnerability exists due to improper access to the filesystem within the handling of FileDirectory OPC UA Objects. A remote administrator can execute arbitrary code on the target system.
6) Interpretation Conflict (CVE-ID: CVE-2023-39481)
The vulnerability allows a remote user to execute arbitrary code on the target system.
The vulnerability exists due to inconsistency in URI parsing between NGINX and application code within the web server. A remote administrator can execute arbitrary code on the target system.
Remediation
Cybersecurity Help is not aware of any official remediation provided by the vendor.
References
- https://www.zerodayinitiative.com/advisories/ZDI-23-1064/
- https://www.zerodayinitiative.com/advisories/ZDI-23-1055/
- https://www.zerodayinitiative.com/advisories/ZDI-23-1060/
- https://www.zerodayinitiative.com/advisories/ZDI-23-1061/
- https://www.zerodayinitiative.com/advisories/ZDI-23-1062/
- https://www.zerodayinitiative.com/advisories/ZDI-23-1063/