Advisory Details

April 8th, 2020

Advantech WebAccess/NMS getSyslogUiList SQL Injection Information Disclosure Vulnerability

ZDI-20-413
ZDI-CAN-9764

CVE ID CVE-2020-10623
CVSS SCORE 6.5, AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
AFFECTED VENDORS Advantech
AFFECTED PRODUCTS WebAccess/NMS
VULNERABILITY DETAILS

This vulnerability allows remote attackers to disclose sensitive information on affected installations of Advantech WebAccess/NMS. Although authentication is required to exploit this vulnerability, the existing authentication mechanism can be bypassed.

The specific flaw exists within the processing of calls to the getSyslogUiList method of the DBUtil class. When parsing the severity, facility, deviceName, deviceIP, dateFrom, and dateTo parameters of the SyslogFuzzySearch endpoint, the process does not properly validate a user-supplied string before using it to construct SQL queries. An attacker can leverage this vulnerability to disclose file contents in the context of SYSTEM.

ADDITIONAL DETAILS Advantech has issued an update to correct this vulnerability. More details can be found at:
https://www.us-cert.gov/ics/advisories/icsa-20-098-01
DISCLOSURE TIMELINE
  • 2019-12-11 - Vulnerability reported to vendor
  • 2020-04-08 - Coordinated public release of advisory
CREDIT rgod
BACK TO ADVISORIES