SB2023090639 - Multiple vulnerabilities in Open Automation Software OAS Platform
Published: September 6, 2023
Breakdown by Severity
- Low
- Medium
- High
- Critical
Description
This security bulletin contains information about 8 secuirty vulnerabilities.
1) Information Exposure Through an Error Message (CVE-ID: CVE-2023-35124)
The vulnerability allows a remote attacker to gain access to potentially sensitive information.
The vulnerability exists due to excessive data output by the application in the OAS Engine configuration management functionality. A remote user can send a specially crafted request and gain unauthorized access to sensitive information on the system.
2) External Control of File Name or Path (CVE-ID: CVE-2023-32615)
The vulnerability allows a remote attacker to create arbitrary files.
The vulnerability exists due to application allows an attacker to control path of the files to delete within the OAS Engine configuration functionality. A remote user can send a specially crafted HTTP request and create or overwrite arbitrary files on the system.
3) Input validation error (CVE-ID: CVE-2023-34317)
The vulnerability allows a remote attacker to compromise the target system.
The vulnerability exists due to insufficient validation of user-supplied input in the OAS Engine User Creation functionality. A remote user can pass specially crafted input to the application and cause unexpected data in the configuration.
4) Information disclosure (CVE-ID: CVE-2023-32271)
The vulnerability allows a remote attacker to gain access to potentially sensitive information.
The vulnerability exists due to excessive data output by the application in the OAS Engine configuration management functionality. A remote user can gain unauthorized access to sensitive information on the system.
5) Use of insufficiently random values (CVE-ID: CVE-2023-34353)
The vulnerability allows a remote attacker to compromise the target system.
The vulnerability exists due to use of insufficiently random values in the OAS Engine authentication functionality. A remote attacker can decrypt sensitive information.
6) Improper access control (CVE-ID: CVE-2023-31242)
The vulnerability allows a remote attacker to gain unauthorized access to otherwise restricted functionality.
The vulnerability exists due to improper access restrictions in the OAS Engine functionality. A remote attacker can bypass implemented security restrictions and gain unauthorized access to the application.
7) Cleartext transmission of sensitive information (CVE-ID: CVE-2023-34998)
The vulnerability allows a remote attacker to bypass authentication.
The vulnerability exists due to software uses insecure communication channel to transmit sensitive information in the OAS Engine functionality. A remote attacker can bypass authentication on the target system.
8) Allocation of Resources Without Limits or Throttling (CVE-ID: CVE-2023-34994)
The vulnerability allows a remote attacker to compromise the target system.
The vulnerability exists due to improper resource allocation issue in the OAS Engine configuration management functionality. A remote user can pass specially crafted input to the application and create an arbitrary directory.
Remediation
Install update from vendor's website.
References
- https://talosintelligence.com/vulnerability_reports/TALOS-2023-1775
- https://www.talosintelligence.com/vulnerability_reports/TALOS-2023-1775
- https://talosintelligence.com/vulnerability_reports/TALOS-2023-1771
- https://www.talosintelligence.com/vulnerability_reports/TALOS-2023-1771
- https://talosintelligence.com/vulnerability_reports/TALOS-2023-1772
- https://www.talosintelligence.com/vulnerability_reports/TALOS-2023-1772
- https://talosintelligence.com/vulnerability_reports/TALOS-2023-1774
- https://www.talosintelligence.com/vulnerability_reports/TALOS-2023-1774
- https://talosintelligence.com/vulnerability_reports/TALOS-2023-1776
- https://www.talosintelligence.com/vulnerability_reports/TALOS-2023-1776
- https://talosintelligence.com/vulnerability_reports/TALOS-2023-1769
- https://www.talosintelligence.com/vulnerability_reports/TALOS-2023-1769
- https://talosintelligence.com/vulnerability_reports/TALOS-2023-1770
- https://www.talosintelligence.com/vulnerability_reports/TALOS-2023-1770
- https://talosintelligence.com/vulnerability_reports/TALOS-2023-1773
- https://www.talosintelligence.com/vulnerability_reports/TALOS-2023-1773