var-201511-0019
Vulnerability from variot

ag_server_service.exe in the AggreGate Server Service in Tibbo AggreGate before 5.30.06 allows local users to execute arbitrary Java code with SYSTEM privileges by using the Apache Axis AdminService deployment method to publish a class. Supplementary information : CWE Vulnerability type by CWE-434: Unrestricted Upload of File with Dangerous Type ( Unlimited upload of dangerous types of files ) Has been identified. This vulnerability allows attackers to elevate privileges on vulnerable installations of Tibbo AggreGate SCADA/HMI. An attacker can leverage this vulnerability to execute code under the context of SYSTEM. Tibbo Technology AggreGate is a set of IoT platforms that Tibbo Technology uses to configure and monitor different electronic devices through network technology. AggreGate Platform is prone to multiple arbitrary file-upload vulnerabilities

Show details on source website


{
  "affected_products": {
    "_id": null,
    "data": [
      {
        "_id": null,
        "model": "aggregate",
        "scope": "lte",
        "trust": 1.0,
        "vendor": "tibbo",
        "version": "5.21.02"
      },
      {
        "_id": null,
        "model": "aggregate",
        "scope": "lt",
        "trust": 0.8,
        "vendor": "tibbo",
        "version": "(scada/hmi) 5.30.06"
      },
      {
        "_id": null,
        "model": "aggregate scada/hmi",
        "scope": null,
        "trust": 0.7,
        "vendor": "tibbo",
        "version": null
      },
      {
        "_id": null,
        "model": "technology aggregate platform",
        "scope": "lt",
        "trust": 0.6,
        "vendor": "tibbo",
        "version": "5.30.06"
      },
      {
        "_id": null,
        "model": "aggregate",
        "scope": "eq",
        "trust": 0.6,
        "vendor": "tibbo",
        "version": "5.21.02"
      }
    ],
    "sources": [
      {
        "db": "ZDI",
        "id": "ZDI-15-572"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2015-07767"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2015-006004"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201511-387"
      },
      {
        "db": "NVD",
        "id": "CVE-2015-7913"
      }
    ]
  },
  "configurations": {
    "_id": null,
    "data": [
      {
        "CVE_data_version": "4.0",
        "nodes": [
          {
            "cpe_match": [
              {
                "cpe22Uri": "cpe:/a:tibbo:aggregate",
                "vulnerable": true
              }
            ],
            "operator": "OR"
          }
        ]
      }
    ],
    "sources": [
      {
        "db": "JVNDB",
        "id": "JVNDB-2015-006004"
      }
    ]
  },
  "credits": {
    "_id": null,
    "data": "rgod",
    "sources": [
      {
        "db": "ZDI",
        "id": "ZDI-15-572"
      }
    ],
    "trust": 0.7
  },
  "cve": "CVE-2015-7913",
  "cvss": {
    "_id": null,
    "data": [
      {
        "cvssV2": [
          {
            "accessComplexity": "LOW",
            "accessVector": "LOCAL",
            "authentication": "NONE",
            "author": "nvd@nist.gov",
            "availabilityImpact": "COMPLETE",
            "baseScore": 7.2,
            "confidentialityImpact": "COMPLETE",
            "exploitabilityScore": 3.9,
            "id": "CVE-2015-7913",
            "impactScore": 10.0,
            "integrityImpact": "COMPLETE",
            "severity": "HIGH",
            "trust": 2.5,
            "vectorString": "AV:L/AC:L/Au:N/C:C/I:C/A:C",
            "version": "2.0"
          },
          {
            "accessComplexity": "LOW",
            "accessVector": "LOCAL",
            "authentication": "NONE",
            "author": "CNVD",
            "availabilityImpact": "COMPLETE",
            "baseScore": 7.2,
            "confidentialityImpact": "COMPLETE",
            "exploitabilityScore": 3.9,
            "id": "CNVD-2015-07767",
            "impactScore": 10.0,
            "integrityImpact": "COMPLETE",
            "severity": "HIGH",
            "trust": 0.6,
            "vectorString": "AV:L/AC:L/Au:N/C:C/I:C/A:C",
            "version": "2.0"
          }
        ],
        "cvssV3": [],
        "severity": [
          {
            "author": "nvd@nist.gov",
            "id": "CVE-2015-7913",
            "trust": 1.0,
            "value": "HIGH"
          },
          {
            "author": "NVD",
            "id": "CVE-2015-7913",
            "trust": 0.8,
            "value": "High"
          },
          {
            "author": "ZDI",
            "id": "CVE-2015-7913",
            "trust": 0.7,
            "value": "HIGH"
          },
          {
            "author": "CNVD",
            "id": "CNVD-2015-07767",
            "trust": 0.6,
            "value": "HIGH"
          },
          {
            "author": "CNNVD",
            "id": "CNNVD-201511-387",
            "trust": 0.6,
            "value": "HIGH"
          }
        ]
      }
    ],
    "sources": [
      {
        "db": "ZDI",
        "id": "ZDI-15-572"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2015-07767"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2015-006004"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201511-387"
      },
      {
        "db": "NVD",
        "id": "CVE-2015-7913"
      }
    ]
  },
  "description": {
    "_id": null,
    "data": "ag_server_service.exe in the AggreGate Server Service in Tibbo AggreGate before 5.30.06 allows local users to execute arbitrary Java code with SYSTEM privileges by using the Apache Axis AdminService deployment method to publish a class. Supplementary information : CWE Vulnerability type by CWE-434: Unrestricted Upload of File with Dangerous Type ( Unlimited upload of dangerous types of files ) Has been identified. This vulnerability allows attackers to elevate privileges on vulnerable installations of Tibbo AggreGate SCADA/HMI. An attacker can leverage this vulnerability to execute code under the context of SYSTEM. Tibbo Technology AggreGate is a set of IoT platforms that Tibbo Technology uses to configure and monitor different electronic devices through network technology. AggreGate Platform is prone to multiple arbitrary file-upload vulnerabilities",
    "sources": [
      {
        "db": "NVD",
        "id": "CVE-2015-7913"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2015-006004"
      },
      {
        "db": "ZDI",
        "id": "ZDI-15-572"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2015-07767"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201511-387"
      },
      {
        "db": "BID",
        "id": "77658"
      }
    ],
    "trust": 3.6
  },
  "external_ids": {
    "_id": null,
    "data": [
      {
        "db": "NVD",
        "id": "CVE-2015-7913",
        "trust": 4.0
      },
      {
        "db": "ICS CERT",
        "id": "ICSA-15-323-01",
        "trust": 3.0
      },
      {
        "db": "ZDI",
        "id": "ZDI-15-572",
        "trust": 2.9
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2015-006004",
        "trust": 0.8
      },
      {
        "db": "ZDI_CAN",
        "id": "ZDI-CAN-3135",
        "trust": 0.7
      },
      {
        "db": "CNVD",
        "id": "CNVD-2015-07767",
        "trust": 0.6
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201511-387",
        "trust": 0.6
      },
      {
        "db": "BID",
        "id": "77658",
        "trust": 0.3
      }
    ],
    "sources": [
      {
        "db": "ZDI",
        "id": "ZDI-15-572"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2015-07767"
      },
      {
        "db": "BID",
        "id": "77658"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2015-006004"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201511-387"
      },
      {
        "db": "NVD",
        "id": "CVE-2015-7913"
      }
    ]
  },
  "id": "VAR-201511-0019",
  "iot": {
    "_id": null,
    "data": true,
    "sources": [
      {
        "db": "CNVD",
        "id": "CNVD-2015-07767"
      }
    ],
    "trust": 1.6
  },
  "iot_taxonomy": {
    "_id": null,
    "data": [
      {
        "category": [
          "IoT"
        ],
        "sub_category": null,
        "trust": 0.6
      }
    ],
    "sources": [
      {
        "db": "CNVD",
        "id": "CNVD-2015-07767"
      }
    ]
  },
  "last_update_date": "2024-11-23T22:27:04.491000Z",
  "patch": {
    "_id": null,
    "data": [
      {
        "title": "AggreGate",
        "trust": 0.8,
        "url": "http://aggregate.tibbo.com/"
      },
      {
        "title": "Tibbo has issued an update to correct this vulnerability.",
        "trust": 0.7,
        "url": "https://ics-cert.us-cert.gov/advisories/ICSA-15-323-01"
      },
      {
        "title": "Patch for Tibbo Technology AggreGate Privilege Escalation Vulnerability",
        "trust": 0.6,
        "url": "https://www.cnvd.org.cn/patchInfo/show/67105"
      },
      {
        "title": "Tibbo Technology AggreGate Security vulnerabilities",
        "trust": 0.6,
        "url": "http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=58836"
      }
    ],
    "sources": [
      {
        "db": "ZDI",
        "id": "ZDI-15-572"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2015-07767"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2015-006004"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201511-387"
      }
    ]
  },
  "problemtype_data": {
    "_id": null,
    "data": [
      {
        "problemtype": "NVD-CWE-Other",
        "trust": 1.0
      },
      {
        "problemtype": "CWE-Other",
        "trust": 0.8
      }
    ],
    "sources": [
      {
        "db": "JVNDB",
        "id": "JVNDB-2015-006004"
      },
      {
        "db": "NVD",
        "id": "CVE-2015-7913"
      }
    ]
  },
  "references": {
    "_id": null,
    "data": [
      {
        "trust": 3.7,
        "url": "https://ics-cert.us-cert.gov/advisories/icsa-15-323-01"
      },
      {
        "trust": 2.2,
        "url": "http://zerodayinitiative.com/advisories/zdi-15-572/"
      },
      {
        "trust": 0.8,
        "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2015-7913"
      },
      {
        "trust": 0.8,
        "url": "http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2015-7913"
      }
    ],
    "sources": [
      {
        "db": "ZDI",
        "id": "ZDI-15-572"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2015-07767"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2015-006004"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201511-387"
      },
      {
        "db": "NVD",
        "id": "CVE-2015-7913"
      }
    ]
  },
  "sources": {
    "_id": null,
    "data": [
      {
        "db": "ZDI",
        "id": "ZDI-15-572",
        "ident": null
      },
      {
        "db": "CNVD",
        "id": "CNVD-2015-07767",
        "ident": null
      },
      {
        "db": "BID",
        "id": "77658",
        "ident": null
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2015-006004",
        "ident": null
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201511-387",
        "ident": null
      },
      {
        "db": "NVD",
        "id": "CVE-2015-7913",
        "ident": null
      }
    ]
  },
  "sources_release_date": {
    "_id": null,
    "data": [
      {
        "date": "2015-11-20T00:00:00",
        "db": "ZDI",
        "id": "ZDI-15-572",
        "ident": null
      },
      {
        "date": "2015-11-25T00:00:00",
        "db": "CNVD",
        "id": "CNVD-2015-07767",
        "ident": null
      },
      {
        "date": "2015-11-19T00:00:00",
        "db": "BID",
        "id": "77658",
        "ident": null
      },
      {
        "date": "2015-11-24T00:00:00",
        "db": "JVNDB",
        "id": "JVNDB-2015-006004",
        "ident": null
      },
      {
        "date": "2015-11-23T00:00:00",
        "db": "CNNVD",
        "id": "CNNVD-201511-387",
        "ident": null
      },
      {
        "date": "2015-11-21T11:59:25.923000",
        "db": "NVD",
        "id": "CVE-2015-7913",
        "ident": null
      }
    ]
  },
  "sources_update_date": {
    "_id": null,
    "data": [
      {
        "date": "2015-11-20T00:00:00",
        "db": "ZDI",
        "id": "ZDI-15-572",
        "ident": null
      },
      {
        "date": "2015-11-25T00:00:00",
        "db": "CNVD",
        "id": "CNVD-2015-07767",
        "ident": null
      },
      {
        "date": "2015-12-07T22:25:00",
        "db": "BID",
        "id": "77658",
        "ident": null
      },
      {
        "date": "2015-11-24T00:00:00",
        "db": "JVNDB",
        "id": "JVNDB-2015-006004",
        "ident": null
      },
      {
        "date": "2015-11-23T00:00:00",
        "db": "CNNVD",
        "id": "CNNVD-201511-387",
        "ident": null
      },
      {
        "date": "2024-11-21T02:37:39.540000",
        "db": "NVD",
        "id": "CVE-2015-7913",
        "ident": null
      }
    ]
  },
  "threat_type": {
    "_id": null,
    "data": "local",
    "sources": [
      {
        "db": "CNNVD",
        "id": "CNNVD-201511-387"
      }
    ],
    "trust": 0.6
  },
  "title": {
    "_id": null,
    "data": "Tibbo AggreGate of  AggreGate Server Service of  ag_server_service.exe In any  Java Code execution vulnerability",
    "sources": [
      {
        "db": "JVNDB",
        "id": "JVNDB-2015-006004"
      }
    ],
    "trust": 0.8
  },
  "type": {
    "_id": null,
    "data": "Input Validation Error",
    "sources": [
      {
        "db": "BID",
        "id": "77658"
      }
    ],
    "trust": 0.3
  }
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
  • Confirmed: The vulnerability is confirmed from an analyst perspective.
  • Published Proof of Concept: A public proof of concept is available for this vulnerability.
  • Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
  • Patched: This vulnerability was successfully patched by the user reporting the sighting.
  • Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
  • Not confirmed: The user expresses doubt about the veracity of the vulnerability.
  • Not patched: This vulnerability was not successfully patched by the user reporting the sighting.


Loading…

Loading…