ID CVE-2019-11897
Summary A Server-Side Request Forgery (SSRF) vulnerability in the backup & restore functionality in earlier versions than ProSyst mBS SDK 8.2.6 and Bosch IoT Gateway Software 9.3.0 allows a remote attacker to forge GET requests to arbitrary URLs. In addition, this could potentially allow an attacker to read sensitive zip files from the local server.
References
Vulnerable Configurations
  • cpe:2.3:a:bosch:iot_gateway_software:-:*:*:*:*:*:*:*
    cpe:2.3:a:bosch:iot_gateway_software:-:*:*:*:*:*:*:*
  • cpe:2.3:a:bosch:iot_gateway_software:9.0.0:*:*:*:*:*:*:*
    cpe:2.3:a:bosch:iot_gateway_software:9.0.0:*:*:*:*:*:*:*
  • cpe:2.3:a:bosch:iot_gateway_software:9.0.1:*:*:*:*:*:*:*
    cpe:2.3:a:bosch:iot_gateway_software:9.0.1:*:*:*:*:*:*:*
  • cpe:2.3:a:bosch:iot_gateway_software:9.0.2:*:*:*:*:*:*:*
    cpe:2.3:a:bosch:iot_gateway_software:9.0.2:*:*:*:*:*:*:*
  • cpe:2.3:a:bosch:iot_gateway_software:9.0.3:*:*:*:*:*:*:*
    cpe:2.3:a:bosch:iot_gateway_software:9.0.3:*:*:*:*:*:*:*
  • cpe:2.3:a:bosch:iot_gateway_software:9.0.4:*:*:*:*:*:*:*
    cpe:2.3:a:bosch:iot_gateway_software:9.0.4:*:*:*:*:*:*:*
  • cpe:2.3:a:bosch:iot_gateway_software:9.1.0:*:*:*:*:*:*:*
    cpe:2.3:a:bosch:iot_gateway_software:9.1.0:*:*:*:*:*:*:*
  • cpe:2.3:a:bosch:iot_gateway_software:9.1.1:*:*:*:*:*:*:*
    cpe:2.3:a:bosch:iot_gateway_software:9.1.1:*:*:*:*:*:*:*
  • cpe:2.3:a:bosch:iot_gateway_software:9.2.0:*:*:*:*:*:*:*
    cpe:2.3:a:bosch:iot_gateway_software:9.2.0:*:*:*:*:*:*:*
  • cpe:2.3:a:bosch:prosyst_mbs_sdk:-:*:*:*:*:*:*:*
    cpe:2.3:a:bosch:prosyst_mbs_sdk:-:*:*:*:*:*:*:*
  • cpe:2.3:a:bosch:prosyst_mbs_sdk:7.5:*:*:*:*:*:*:*
    cpe:2.3:a:bosch:prosyst_mbs_sdk:7.5:*:*:*:*:*:*:*
  • cpe:2.3:a:bosch:prosyst_mbs_sdk:7.5.1:*:*:*:*:*:*:*
    cpe:2.3:a:bosch:prosyst_mbs_sdk:7.5.1:*:*:*:*:*:*:*
  • cpe:2.3:a:bosch:prosyst_mbs_sdk:8.0:*:*:*:*:*:*:*
    cpe:2.3:a:bosch:prosyst_mbs_sdk:8.0:*:*:*:*:*:*:*
  • cpe:2.3:a:bosch:prosyst_mbs_sdk:8.1:*:*:*:*:*:*:*
    cpe:2.3:a:bosch:prosyst_mbs_sdk:8.1:*:*:*:*:*:*:*
  • cpe:2.3:a:bosch:prosyst_mbs_sdk:8.2.2:*:*:*:*:*:*:*
    cpe:2.3:a:bosch:prosyst_mbs_sdk:8.2.2:*:*:*:*:*:*:*
  • cpe:2.3:a:bosch:prosyst_mbs_sdk:8.2.3:*:*:*:*:*:*:*
    cpe:2.3:a:bosch:prosyst_mbs_sdk:8.2.3:*:*:*:*:*:*:*
  • cpe:2.3:a:bosch:prosyst_mbs_sdk:8.2.4:*:*:*:*:*:*:*
    cpe:2.3:a:bosch:prosyst_mbs_sdk:8.2.4:*:*:*:*:*:*:*
  • cpe:2.3:a:bosch:prosyst_mbs_sdk:8.2.5:*:*:*:*:*:*:*
    cpe:2.3:a:bosch:prosyst_mbs_sdk:8.2.5:*:*:*:*:*:*:*
CVSS
Base: 5.0 (as of 09-10-2019 - 23:45)
Impact:
Exploitability:
CWE CWE-918
CAPEC
Access
VectorComplexityAuthentication
NETWORK LOW NONE
Impact
ConfidentialityIntegrityAvailability
PARTIAL NONE NONE
cvss-vector via4 AV:N/AC:L/Au:N/C:P/I:N/A:N
refmap via4
confirm https://psirt.bosch.com/Advisory/BOSCH-SA-562575.html
Last major update 09-10-2019 - 23:45
Published 21-08-2019 - 18:15
Last modified 09-10-2019 - 23:45
Back to Top