search menu icon-carat-right cmu-wordmark

CERT Coordination Center


Quantum Scalar i500, Dell ML6000 and IBM TS3310 tape libraries web interface and preconfigured password vulnerabilities

Vulnerability Note VU#913483

Original Release Date: 2012-03-19 | Last Revised: 2014-07-29

Overview

Cross scripting and preconfigured password vulnerabilities have been reported to exist in the Quantum Scalar i500, Dell ML6000 and IBM TS3310 tape libraries.

Description

Quantum Scalar i500, Dell ML6000 and IBM TS3310 enterprise tape libraries contain multiple web interface and preconfigured account password vulnerabilities.

The Quantum Scalar i500 and Dell ML6000 tape libraries contain the following web interface vulnerabilities.

The web interface allows an unauthenticated remote user to view any file on the web server, for example http://device/logShow.htm?file=/etc/shadow (CVE-2012-1841).
A cross-site scripting vulnerability in http://device/checkQKMProg.htm allows compromise of active session ids (CVE-2012-1842).
A command-injection vulnerability in http://device/saveRestore.htm (via the fileName POST parameter) allows execution of arbitrary commands as the root user, by an authenticated remote web user (CVE-2012-1843).
The Quantum Scalar i500, Dell ML6000 and IBM TS3310 tape libraries also contain preconfigured passwords for certain accounts which are considered to be weak and could be exploited allowing an attacker user access (CVE-2012-1844).

The CVSS metrics below apply to CVE-2012-1844.

Impact

An attacker with access to a local user account or via malicious URL can execute arbitrary code or commands on the vulnerable system. It has been reported to us that customer data residing on the tapes within the libraries are not affected.

Solution

Upgrade firmware

Quantum has released a firmware update i7.0.3 (604G.GS00100) or greater will correct these issues.

Dell firmware update A20-00 (590G.GS00100) or greater will correct these issues.

IBM firmware update R6C (606G.GS001) or greater will correct these issues.

Restrict access

As a general good security practice, only allow connections from trusted hosts and networks. Note that restricting access does not prevent XSS or CSRF attacks since the attack comes as an HTTP request from a legitimate user's host. Restricting access would prevent an attacker from accessing a Quantum Scalar i500, Dell ML6000 and IBM TS3310 tape libraries using stolen credentials from a blocked network location.

Vendor Information

913483
Expand all

Dell Computer Corporation, Inc.

Notified:  November 16, 2011 Updated:  March 02, 2012

Status

  Affected

Vendor Statement

No statement is currently available from the vendor regarding this vulnerability.

Vendor Information

Dell firmware update A20-00 (590G.GS00100) or greater will correct these issues.

Vendor References

http://support.dell.com

Addendum

There are no additional comments at this time.

If you have feedback, comments, or additional information about this vulnerability, please send us email.

IBM Corporation

Notified:  November 23, 2011 Updated:  March 02, 2012

Status

  Affected

Vendor Statement

No statement is currently available from the vendor regarding this vulnerability.

Vendor Information

IBM firmware update R6C (606G.GS001) or greater will correct these issues.

Vendor References

http://www-933.ibm.com/support/fixcentral/

Addendum

There are no additional comments at this time.

If you have feedback, comments, or additional information about this vulnerability, please send us email.

Quantum

Notified:  November 23, 2011 Updated:  March 02, 2012

Status

  Affected

Vendor Statement

No statement is currently available from the vendor regarding this vulnerability.

Vendor Information

Quantum has released a firmware update i7.0.3 (604G.GS00100) or greater will correct these issues.

Vendor References

http://www.quantum.com/ServiceandSupport/SoftwareandDocumentationDownloads/SI500/Index.aspx

Addendum

There are no additional comments at this time.

If you have feedback, comments, or additional information about this vulnerability, please send us email.


CVSS Metrics

Group Score Vector
Base 6.8 AV:N/AC:M/Au:N/C:P/I:P/A:P
Temporal 5.3 E:POC/RL:OF/RC:C
Environmental 1.3 CDP:ND/TD:L/CR:ND/IR:ND/AR:ND

References

Credit

Thanks to NOAA CIRT for reporting this vulnerability.

This document was written by Michael Orlando.

Other Information

CVE IDs: CVE-2012-1844, CVE-2012-1843, CVE-2012-1842, CVE-2012-1841
Date Public: 2012-03-19
Date First Published: 2012-03-19
Date Last Updated: 2014-07-29 21:59 UTC
Document Revision: 44

Sponsored by the Department of Homeland Security Office of Cybersecurity and Communications.