SB2023090639 - Multiple vulnerabilities in Open Automation Software OAS Platform
Published: September 6, 2023
Breakdown by Severity
- Low
- Medium
- High
- Critical
Description
This security bulletin contains information about 8 vulnerabilities.
1) Information Exposure Through an Error Message (CVE-ID: CVE-2023-35124)
CWE-ID: CWE-209 - Information Exposure Through an Error Message
CVSSv4: CVSS:4.0/AV:N/AC:L/AT:P/PR:L/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N/E:U/U:Clear
The vulnerability allows a remote attacker to gain access to potentially sensitive information.
The vulnerability exists due to excessive data output by the application in the OAS Engine configuration management functionality. A remote user can send a specially crafted request and gain unauthorized access to sensitive information on the system.
2) External Control of File Name or Path (CVE-ID: CVE-2023-32615)
CWE-ID: CWE-73 - External Control of File Name or Path
CVSSv4: CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:N/VI:H/VA:N/SC:N/SI:N/SA:N/E:U/U:Green
The vulnerability allows a remote attacker to create arbitrary files.
The vulnerability exists due to application allows an attacker to control path of the files to delete within the OAS Engine configuration functionality. A remote user can send a specially crafted HTTP request and create or overwrite arbitrary files on the system.
3) Input validation error (CVE-ID: CVE-2023-34317)
CWE-ID: CWE-20 - Improper input validation
CVSSv4: CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:N/VI:H/VA:N/SC:N/SI:N/SA:N/E:U/U:Green
The vulnerability allows a remote attacker to compromise the target system.
The vulnerability exists due to insufficient validation of user-supplied input in the OAS Engine User Creation functionality. A remote user can pass specially crafted input to the application and cause unexpected data in the configuration.
4) Information disclosure (CVE-ID: CVE-2023-32271)
CWE-ID: CWE-200 - Exposure of sensitive information to an unauthorized actor
CVSSv4: CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N/E:U/U:Green
The vulnerability allows a remote attacker to gain access to potentially sensitive information.
The vulnerability exists due to excessive data output by the application in the OAS Engine configuration management functionality. A remote user can gain unauthorized access to sensitive information on the system.
5) Use of insufficiently random values (CVE-ID: CVE-2023-34353)
CWE-ID: CWE-330 - Use of Insufficiently Random Values
CVSSv4: CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N/E:U/U:Green
The vulnerability allows a remote attacker to compromise the target system.
The vulnerability exists due to use of insufficiently random values in the OAS Engine authentication functionality. A remote attacker can decrypt sensitive information.
6) Improper access control (CVE-ID: CVE-2023-31242)
CWE-ID: CWE-284 - Improper Access Control
CVSSv4: CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Amber
The vulnerability allows a remote attacker to gain unauthorized access to otherwise restricted functionality.
The vulnerability exists due to improper access restrictions in the OAS Engine functionality. A remote attacker can bypass implemented security restrictions and gain unauthorized access to the application.
7) Cleartext transmission of sensitive information (CVE-ID: CVE-2023-34998)
CWE-ID: CWE-319 - Cleartext Transmission of Sensitive Information
CVSSv4: CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Amber
The vulnerability allows a remote attacker to bypass authentication.
The vulnerability exists due to software uses insecure communication channel to transmit sensitive information in the OAS Engine functionality. A remote attacker can bypass authentication on the target system.
8) Allocation of Resources Without Limits or Throttling (CVE-ID: CVE-2023-34994)
CWE-ID: CWE-770 - Allocation of Resources Without Limits or Throttling
CVSSv4: CVSS:4.0/AV:N/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:U/U:Clear
The vulnerability allows a remote attacker to compromise the target system.
The vulnerability exists due to improper resource allocation issue in the OAS Engine configuration management functionality. A remote user can pass specially crafted input to the application and create an arbitrary directory.
Remediation
Install update from vendor's website.
References
- https://talosintelligence.com/vulnerability_reports/TALOS-2023-1775
- https://www.talosintelligence.com/vulnerability_reports/TALOS-2023-1775
- https://talosintelligence.com/vulnerability_reports/TALOS-2023-1771
- https://www.talosintelligence.com/vulnerability_reports/TALOS-2023-1771
- https://talosintelligence.com/vulnerability_reports/TALOS-2023-1772
- https://www.talosintelligence.com/vulnerability_reports/TALOS-2023-1772
- https://talosintelligence.com/vulnerability_reports/TALOS-2023-1774
- https://www.talosintelligence.com/vulnerability_reports/TALOS-2023-1774
- https://talosintelligence.com/vulnerability_reports/TALOS-2023-1776
- https://www.talosintelligence.com/vulnerability_reports/TALOS-2023-1776
- https://talosintelligence.com/vulnerability_reports/TALOS-2023-1769
- https://www.talosintelligence.com/vulnerability_reports/TALOS-2023-1769
- https://talosintelligence.com/vulnerability_reports/TALOS-2023-1770
- https://www.talosintelligence.com/vulnerability_reports/TALOS-2023-1770
- https://talosintelligence.com/vulnerability_reports/TALOS-2023-1773
- https://www.talosintelligence.com/vulnerability_reports/TALOS-2023-1773