Secunia CSI7
Advisories
Research
Forums
Create Profile
Our Commitment
Database
Search
Advisories by Product
Advisories by Vendor
Terminology
Report Vulnerability
Insecure Library Loading
Moderately critical

Eaton Network Shutdown Module Multiple Vulnerabilities

-

Release Date:  2012-06-22    Views:  1,962

Secunia Advisory SA49103

Where:

From local network

Impact:

Exposure of sensitive information, System access

Solution Status:

Unpatched

CVE Reference(s):

No CVE references.

Description


Hans-Martin Münch has discovered multiple vulnerabilities in Eaton Network Shutdown Module, which can be exploited by malicious, local users to disclose sensitive information and by malicious people to disclose sensitive information and compromise a vulnerable system.

1) Input passed via the "paneStatusListSortBy" parameter to view_list.php is not properly sanitised before being used in an "eval()" call and can be exploited to execute arbitrary PHP code.

Successful exploitation of this vulnerability requires that at least one power device is defined in the system.

2) An error due to the application creating session files inside a web accessible directory and without access restrictions can be exploited to disclose another user's session information.

NOTE: This vulnerability affects applications running on Windows only.

3) An error due to the application setting insecure file system permissions on the accounts database file can be exploited to disclose the password of an administrative user.

The vulnerabilities are confirmed in version 3.21 build 01. Other versions may also be affected.


Solution:
Restrict access to trusted users and trusted hosts only.

Provided and/or discovered by:
Hans-Martin Münch via Secunia.

Deep Links:
Links available to Secunia VIM customers

Do you have additional information related to this advisory?

Please provide information about patches, mitigating factors, new versions, exploits, faulty patches, links, and other relevant data by posting comments to this Advisory. You can also send this information to vuln@secunia.com

Subject: Eaton Network Shutdown Module Multiple Vulnerabilities

No posts yet

-

You must be logged in to post a comment.



 Products Solutions Customers Partner Resources Company
 
 Corporate
Vulnerability Intelligence Manager (VIM)
Corporate Software Inspector (CSI)
Consumer
Personal Software Inspector (PSI)
Online Software Inspector (OSI)
 Industry
Compliance
Technology
Integration
 Customers
Testimonials
 VARS
MSSP
Technology Partners
References
 Factsheets
Reports
Webinars
Events
 About us
Careers
Memberships
Newsroom


 
© 2002-2014 Secunia ApS - Rued Langgaards Vej 8, 4th floor, DK-2300 Copenhagen, Denmark - +45 7020 5144
Terms & Conditions and Copyright - Privacy - Report Vulnerability