var-201702-0697
Vulnerability from variot

An issue was discovered in Carlo Gavazzi VMU-C EM prior to firmware Version A11_U05, and VMU-C PV prior to firmware Version A17. Successful exploitation of this CROSS-SITE REQUEST FORGERY (CSRF) vulnerability can allow execution of unauthorized actions on the device such as configuration parameter changes, and saving modified configuration. CarloGavazziAutomationVMU-CEM and VMU-CPV are control modules in the automation products of Italy's CarloGavazzi Automation. There is a cross-site request forgery vulnerability in CarloGavazziAutomationVMU-CEM and VMU-CPV. A remote attacker exploits a vulnerability to trick a user into parsing by constructing a malicious URL to perform malicious actions in the context of the target user. Exploiting these issues may allow a remote attacker to gain access to the sensitive information, or perform certain administrative actions and gain unauthorized access to the affected application. Other attacks are also possible. An attacker could exploit the vulnerability to perform unauthorized operations. VMU-C Web-Server solution for photovoltaic applications

VMU-C EM is a data logger system for small to medium projects, VMUC-Y EM is a hardware data aggregator for medium to larger projects and Em2 Server is a software solution for large projects. They are designed to complement the extensive line of Carlo Gavazzi energy meters and current transformers. Weak Credentials Management* -> admin/admin -> Application does not enforce mandatory password change

2. Sensitive Information stored in clear-text Accounts menu option a shows username and password a passwords shown in clear-text a SMTP server password a user and service passwords are stored in clear-text

3. Access Control flaws

  1. Access control is not enforced correctly
  2. Certain application functions can be accessed without any authentication
  3. Application stores the Energy / Plant data in a sqlite database - EWPlant.db. Anyone can dump plant database file - without any authentication

4. Reflected + Stored XSS - multiple URLs, parameters - Not documented in ICS-CERT Advisory

Successful exploitation of this vulnerability could allow an unauthenticated attacker to inject arbitrary JavaScript in a specially crafted URL request where the response containing user data is returned to the web browser without being made safe to display.

*5.

+++++

Show details on source website


{
  "@context": {
    "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#",
    "affected_products": {
      "@id": "https://www.variotdbs.pl/ref/affected_products"
    },
    "configurations": {
      "@id": "https://www.variotdbs.pl/ref/configurations"
    },
    "credits": {
      "@id": "https://www.variotdbs.pl/ref/credits"
    },
    "cvss": {
      "@id": "https://www.variotdbs.pl/ref/cvss/"
    },
    "description": {
      "@id": "https://www.variotdbs.pl/ref/description/"
    },
    "exploit_availability": {
      "@id": "https://www.variotdbs.pl/ref/exploit_availability/"
    },
    "external_ids": {
      "@id": "https://www.variotdbs.pl/ref/external_ids/"
    },
    "iot": {
      "@id": "https://www.variotdbs.pl/ref/iot/"
    },
    "iot_taxonomy": {
      "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/"
    },
    "patch": {
      "@id": "https://www.variotdbs.pl/ref/patch/"
    },
    "problemtype_data": {
      "@id": "https://www.variotdbs.pl/ref/problemtype_data/"
    },
    "references": {
      "@id": "https://www.variotdbs.pl/ref/references/"
    },
    "sources": {
      "@id": "https://www.variotdbs.pl/ref/sources/"
    },
    "sources_release_date": {
      "@id": "https://www.variotdbs.pl/ref/sources_release_date/"
    },
    "sources_update_date": {
      "@id": "https://www.variotdbs.pl/ref/sources_update_date/"
    },
    "threat_type": {
      "@id": "https://www.variotdbs.pl/ref/threat_type/"
    },
    "title": {
      "@id": "https://www.variotdbs.pl/ref/title/"
    },
    "type": {
      "@id": "https://www.variotdbs.pl/ref/type/"
    }
  },
  "@id": "https://www.variotdbs.pl/vuln/VAR-201702-0697",
  "affected_products": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/affected_products#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        },
        "@id": "https://www.variotdbs.pl/ref/sources"
      }
    },
    "data": [
      {
        "model": "vmu-c pv",
        "scope": "eq",
        "trust": 1.6,
        "vendor": "carlosgavazzi",
        "version": null
      },
      {
        "model": "vmu-c em",
        "scope": "eq",
        "trust": 1.6,
        "vendor": "carlosgavazzi",
        "version": null
      },
      {
        "model": "vmu-c em",
        "scope": null,
        "trust": 0.8,
        "vendor": "carlo gavazzi",
        "version": null
      },
      {
        "model": "vmu-c em",
        "scope": "lt",
        "trust": 0.8,
        "vendor": "carlo gavazzi",
        "version": "a11_u05"
      },
      {
        "model": "vmu-c pv",
        "scope": null,
        "trust": 0.8,
        "vendor": "carlo gavazzi",
        "version": null
      },
      {
        "model": "vmu-c pv",
        "scope": "lt",
        "trust": 0.8,
        "vendor": "carlo gavazzi",
        "version": "a17"
      },
      {
        "model": "gavazzi vmu-c em \u003ca11 u05",
        "scope": null,
        "trust": 0.6,
        "vendor": "carlo",
        "version": null
      },
      {
        "model": "gavazzi vmu-c pv \u003ca17",
        "scope": null,
        "trust": 0.6,
        "vendor": "carlo",
        "version": null
      },
      {
        "model": "gavazzi vmu-c pv",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "carlo",
        "version": "0"
      },
      {
        "model": "gavazzi vmu-c em",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "carlo",
        "version": "0"
      },
      {
        "model": "gavazzi vmu-c pv a17",
        "scope": "ne",
        "trust": 0.3,
        "vendor": "carlo",
        "version": null
      },
      {
        "model": "gavazzi vmu-c em a11 u05",
        "scope": "ne",
        "trust": 0.3,
        "vendor": "carlo",
        "version": null
      },
      {
        "model": null,
        "scope": "eq",
        "trust": 0.2,
        "vendor": "vmu c em",
        "version": null
      },
      {
        "model": null,
        "scope": "eq",
        "trust": 0.2,
        "vendor": "vmu c pv",
        "version": null
      }
    ],
    "sources": [
      {
        "db": "IVD",
        "id": "699fb07b-5711-4fcb-bc97-0358cd8754c0"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2017-00492"
      },
      {
        "db": "BID",
        "id": "95411"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2017-001714"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201701-324"
      },
      {
        "db": "NVD",
        "id": "CVE-2017-5145"
      }
    ]
  },
  "configurations": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/configurations#",
      "children": {
        "@container": "@list"
      },
      "cpe_match": {
        "@container": "@list"
      },
      "data": {
        "@container": "@list"
      },
      "nodes": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "CVE_data_version": "4.0",
        "nodes": [
          {
            "cpe_match": [
              {
                "cpe22Uri": "cpe:/h:carlosgavazzi:vmu-c_em",
                "vulnerable": true
              },
              {
                "cpe22Uri": "cpe:/o:carlosgavazzi:vmu-c_em_firmware",
                "vulnerable": true
              },
              {
                "cpe22Uri": "cpe:/h:carlosgavazzi:vmu-c_pv",
                "vulnerable": true
              },
              {
                "cpe22Uri": "cpe:/o:carlosgavazzi:vmu-c_pv_firmware",
                "vulnerable": true
              }
            ],
            "operator": "OR"
          }
        ]
      }
    ],
    "sources": [
      {
        "db": "JVNDB",
        "id": "JVNDB-2017-001714"
      }
    ]
  },
  "credits": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/credits#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "Karn Ganeshen",
    "sources": [
      {
        "db": "BID",
        "id": "95411"
      },
      {
        "db": "PACKETSTORM",
        "id": "142045"
      }
    ],
    "trust": 0.4
  },
  "cve": "CVE-2017-5145",
  "cvss": {
    "@context": {
      "cvssV2": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2"
      },
      "cvssV3": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/"
      },
      "severity": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/cvss/severity#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/severity"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        },
        "@id": "https://www.variotdbs.pl/ref/sources"
      }
    },
    "data": [
      {
        "cvssV2": [
          {
            "accessComplexity": "LOW",
            "accessVector": "NETWORK",
            "authentication": "NONE",
            "author": "nvd@nist.gov",
            "availabilityImpact": "PARTIAL",
            "baseScore": 7.5,
            "confidentialityImpact": "PARTIAL",
            "exploitabilityScore": 10.0,
            "id": "CVE-2017-5145",
            "impactScore": 6.4,
            "integrityImpact": "PARTIAL",
            "severity": "HIGH",
            "trust": 1.9,
            "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
            "version": "2.0"
          },
          {
            "accessComplexity": "LOW",
            "accessVector": "NETWORK",
            "authentication": "NONE",
            "author": "CNVD",
            "availabilityImpact": "COMPLETE",
            "baseScore": 10.0,
            "confidentialityImpact": "COMPLETE",
            "exploitabilityScore": 10.0,
            "id": "CNVD-2017-00492",
            "impactScore": 10.0,
            "integrityImpact": "COMPLETE",
            "severity": "HIGH",
            "trust": 0.6,
            "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
            "version": "2.0"
          },
          {
            "accessComplexity": "LOW",
            "accessVector": "NETWORK",
            "authentication": "NONE",
            "author": "IVD",
            "availabilityImpact": "COMPLETE",
            "baseScore": 10.0,
            "confidentialityImpact": "COMPLETE",
            "exploitabilityScore": 10.0,
            "id": "699fb07b-5711-4fcb-bc97-0358cd8754c0",
            "impactScore": 10.0,
            "integrityImpact": "COMPLETE",
            "severity": "HIGH",
            "trust": 0.2,
            "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
            "version": "2.9 [IVD]"
          },
          {
            "accessComplexity": "LOW",
            "accessVector": "NETWORK",
            "authentication": "NONE",
            "author": "VULHUB",
            "availabilityImpact": "PARTIAL",
            "baseScore": 7.5,
            "confidentialityImpact": "PARTIAL",
            "exploitabilityScore": 10.0,
            "id": "VHN-113348",
            "impactScore": 6.4,
            "integrityImpact": "PARTIAL",
            "severity": "HIGH",
            "trust": 0.1,
            "vectorString": "AV:N/AC:L/AU:N/C:P/I:P/A:P",
            "version": "2.0"
          }
        ],
        "cvssV3": [
          {
            "attackComplexity": "LOW",
            "attackVector": "NETWORK",
            "author": "nvd@nist.gov",
            "availabilityImpact": "HIGH",
            "baseScore": 10.0,
            "baseSeverity": "CRITICAL",
            "confidentialityImpact": "HIGH",
            "exploitabilityScore": 3.9,
            "id": "CVE-2017-5145",
            "impactScore": 6.0,
            "integrityImpact": "HIGH",
            "privilegesRequired": "NONE",
            "scope": "CHANGED",
            "trust": 1.8,
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H",
            "version": "3.0"
          }
        ],
        "severity": [
          {
            "author": "nvd@nist.gov",
            "id": "CVE-2017-5145",
            "trust": 1.0,
            "value": "CRITICAL"
          },
          {
            "author": "NVD",
            "id": "CVE-2017-5145",
            "trust": 0.8,
            "value": "Critical"
          },
          {
            "author": "CNVD",
            "id": "CNVD-2017-00492",
            "trust": 0.6,
            "value": "HIGH"
          },
          {
            "author": "CNNVD",
            "id": "CNNVD-201701-324",
            "trust": 0.6,
            "value": "HIGH"
          },
          {
            "author": "IVD",
            "id": "699fb07b-5711-4fcb-bc97-0358cd8754c0",
            "trust": 0.2,
            "value": "HIGH"
          },
          {
            "author": "VULHUB",
            "id": "VHN-113348",
            "trust": 0.1,
            "value": "HIGH"
          },
          {
            "author": "VULMON",
            "id": "CVE-2017-5145",
            "trust": 0.1,
            "value": "HIGH"
          }
        ]
      }
    ],
    "sources": [
      {
        "db": "IVD",
        "id": "699fb07b-5711-4fcb-bc97-0358cd8754c0"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2017-00492"
      },
      {
        "db": "VULHUB",
        "id": "VHN-113348"
      },
      {
        "db": "VULMON",
        "id": "CVE-2017-5145"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2017-001714"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201701-324"
      },
      {
        "db": "NVD",
        "id": "CVE-2017-5145"
      }
    ]
  },
  "description": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/description#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "An issue was discovered in Carlo Gavazzi VMU-C EM prior to firmware Version A11_U05, and VMU-C PV prior to firmware Version A17. Successful exploitation of this CROSS-SITE REQUEST FORGERY (CSRF) vulnerability can allow execution of unauthorized actions on the device such as configuration parameter changes, and saving modified configuration. CarloGavazziAutomationVMU-CEM and VMU-CPV are control modules in the automation products of Italy\u0027s CarloGavazzi Automation. There is a cross-site request forgery vulnerability in CarloGavazziAutomationVMU-CEM and VMU-CPV. A remote attacker exploits a vulnerability to trick a user into parsing by constructing a malicious URL to perform malicious actions in the context of the target user. \nExploiting these issues may allow a remote attacker to gain access to the sensitive information, or perform certain administrative actions and gain unauthorized access to the affected application. Other attacks are also possible. An attacker could exploit the vulnerability to perform unauthorized operations. *VMU-C Web-Server solution for photovoltaic applications*\n\nVMU-C EM is a data logger system for small to medium projects, VMUC-Y EM is\na hardware data aggregator for medium to larger projects and Em2 Server is\na software solution for large projects. They are designed to complement the\nextensive line of Carlo Gavazzi energy meters and current transformers. Weak Credentials Management*\n-\u003e admin/admin\n-\u003e Application does not enforce mandatory password change\n\n*2. Sensitive Information stored in clear-text*\nAccounts menu option\na shows username and password\na passwords shown in clear-text\na SMTP server password\na user and service passwords are stored in clear-text\n\n*3. Access Control flaws*\n\n   1. Access control is not enforced correctly\n   2. Certain application functions can be accessed without any\n   authentication\n   3. Application stores the Energy / Plant data in a sqlite database -\n   EWPlant.db. Anyone can dump plant database file - without any authentication\n\n*4. Reflected + Stored XSS - multiple URLs, parameters - *Not documented in\nICS-CERT Advisory\n\nSuccessful exploitation of this vulnerability could allow an\nunauthenticated attacker to inject arbitrary JavaScript in a specially\ncrafted URL request where the response containing user data is returned to\nthe web browser without being made safe to display. \n\n*5. \n\n+++++\n\n\n",
    "sources": [
      {
        "db": "NVD",
        "id": "CVE-2017-5145"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2017-001714"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2017-00492"
      },
      {
        "db": "BID",
        "id": "95411"
      },
      {
        "db": "IVD",
        "id": "699fb07b-5711-4fcb-bc97-0358cd8754c0"
      },
      {
        "db": "VULHUB",
        "id": "VHN-113348"
      },
      {
        "db": "VULMON",
        "id": "CVE-2017-5145"
      },
      {
        "db": "PACKETSTORM",
        "id": "142045"
      }
    ],
    "trust": 2.88
  },
  "external_ids": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/external_ids#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "db": "NVD",
        "id": "CVE-2017-5145",
        "trust": 3.8
      },
      {
        "db": "ICS CERT",
        "id": "ICSA-17-012-03",
        "trust": 3.6
      },
      {
        "db": "BID",
        "id": "95411",
        "trust": 2.1
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201701-324",
        "trust": 0.9
      },
      {
        "db": "CNVD",
        "id": "CNVD-2017-00492",
        "trust": 0.8
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2017-001714",
        "trust": 0.8
      },
      {
        "db": "IVD",
        "id": "699FB07B-5711-4FCB-BC97-0358CD8754C0",
        "trust": 0.2
      },
      {
        "db": "VULHUB",
        "id": "VHN-113348",
        "trust": 0.1
      },
      {
        "db": "VULMON",
        "id": "CVE-2017-5145",
        "trust": 0.1
      },
      {
        "db": "PACKETSTORM",
        "id": "142045",
        "trust": 0.1
      }
    ],
    "sources": [
      {
        "db": "IVD",
        "id": "699fb07b-5711-4fcb-bc97-0358cd8754c0"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2017-00492"
      },
      {
        "db": "VULHUB",
        "id": "VHN-113348"
      },
      {
        "db": "VULMON",
        "id": "CVE-2017-5145"
      },
      {
        "db": "BID",
        "id": "95411"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2017-001714"
      },
      {
        "db": "PACKETSTORM",
        "id": "142045"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201701-324"
      },
      {
        "db": "NVD",
        "id": "CVE-2017-5145"
      }
    ]
  },
  "id": "VAR-201702-0697",
  "iot": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/iot#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": true,
    "sources": [
      {
        "db": "IVD",
        "id": "699fb07b-5711-4fcb-bc97-0358cd8754c0"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2017-00492"
      },
      {
        "db": "VULHUB",
        "id": "VHN-113348"
      }
    ],
    "trust": 1.775
  },
  "iot_taxonomy": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/iot_taxonomy#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "category": [
          "ICS",
          "Network device"
        ],
        "sub_category": null,
        "trust": 0.6
      },
      {
        "category": [
          "ICS"
        ],
        "sub_category": null,
        "trust": 0.2
      }
    ],
    "sources": [
      {
        "db": "IVD",
        "id": "699fb07b-5711-4fcb-bc97-0358cd8754c0"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2017-00492"
      }
    ]
  },
  "last_update_date": "2024-11-23T21:41:47.186000Z",
  "patch": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/patch#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "title": "Top Page",
        "trust": 0.8,
        "url": "http://www.productselection.net/"
      },
      {
        "title": "CarloGavazziAutomationVMU-CEM and VMU-CPV have patches for cross-site request forgery vulnerabilities",
        "trust": 0.6,
        "url": "https://www.cnvd.org.cn/patchInfo/show/88076"
      },
      {
        "title": "Carlo Gavazzi Automation VMU-C EM  and VMU-C PV Fixes for cross-site request forgery vulnerabilities",
        "trust": 0.6,
        "url": "http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=66988"
      }
    ],
    "sources": [
      {
        "db": "CNVD",
        "id": "CNVD-2017-00492"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2017-001714"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201701-324"
      }
    ]
  },
  "problemtype_data": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "problemtype": "CWE-352",
        "trust": 1.9
      }
    ],
    "sources": [
      {
        "db": "VULHUB",
        "id": "VHN-113348"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2017-001714"
      },
      {
        "db": "NVD",
        "id": "CVE-2017-5145"
      }
    ]
  },
  "references": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/references#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "trust": 3.7,
        "url": "https://ics-cert.us-cert.gov/advisories/icsa-17-012-03"
      },
      {
        "trust": 1.2,
        "url": "http://www.securityfocus.com/bid/95411"
      },
      {
        "trust": 0.8,
        "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2017-5145"
      },
      {
        "trust": 0.8,
        "url": "http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2017-5145"
      },
      {
        "trust": 0.6,
        "url": "http://www.securityfocus.com/bid/95411/info"
      },
      {
        "trust": 0.3,
        "url": "http://www.carlogavazzi.com/"
      },
      {
        "trust": 0.1,
        "url": "https://cwe.mitre.org/data/definitions/352.html"
      },
      {
        "trust": 0.1,
        "url": "https://nvd.nist.gov"
      },
      {
        "trust": 0.1,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2017-5145"
      },
      {
        "trust": 0.1,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2017-5144"
      },
      {
        "trust": 0.1,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2017-5146"
      }
    ],
    "sources": [
      {
        "db": "CNVD",
        "id": "CNVD-2017-00492"
      },
      {
        "db": "VULHUB",
        "id": "VHN-113348"
      },
      {
        "db": "VULMON",
        "id": "CVE-2017-5145"
      },
      {
        "db": "BID",
        "id": "95411"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2017-001714"
      },
      {
        "db": "PACKETSTORM",
        "id": "142045"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201701-324"
      },
      {
        "db": "NVD",
        "id": "CVE-2017-5145"
      }
    ]
  },
  "sources": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "db": "IVD",
        "id": "699fb07b-5711-4fcb-bc97-0358cd8754c0"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2017-00492"
      },
      {
        "db": "VULHUB",
        "id": "VHN-113348"
      },
      {
        "db": "VULMON",
        "id": "CVE-2017-5145"
      },
      {
        "db": "BID",
        "id": "95411"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2017-001714"
      },
      {
        "db": "PACKETSTORM",
        "id": "142045"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201701-324"
      },
      {
        "db": "NVD",
        "id": "CVE-2017-5145"
      }
    ]
  },
  "sources_release_date": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "date": "2017-01-17T00:00:00",
        "db": "IVD",
        "id": "699fb07b-5711-4fcb-bc97-0358cd8754c0"
      },
      {
        "date": "2017-01-17T00:00:00",
        "db": "CNVD",
        "id": "CNVD-2017-00492"
      },
      {
        "date": "2017-02-13T00:00:00",
        "db": "VULHUB",
        "id": "VHN-113348"
      },
      {
        "date": "2017-02-13T00:00:00",
        "db": "VULMON",
        "id": "CVE-2017-5145"
      },
      {
        "date": "2017-01-12T00:00:00",
        "db": "BID",
        "id": "95411"
      },
      {
        "date": "2017-03-14T00:00:00",
        "db": "JVNDB",
        "id": "JVNDB-2017-001714"
      },
      {
        "date": "2017-04-06T18:22:22",
        "db": "PACKETSTORM",
        "id": "142045"
      },
      {
        "date": "2017-01-13T00:00:00",
        "db": "CNNVD",
        "id": "CNNVD-201701-324"
      },
      {
        "date": "2017-02-13T21:59:02.550000",
        "db": "NVD",
        "id": "CVE-2017-5145"
      }
    ]
  },
  "sources_update_date": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "date": "2017-01-17T00:00:00",
        "db": "CNVD",
        "id": "CNVD-2017-00492"
      },
      {
        "date": "2017-02-24T00:00:00",
        "db": "VULHUB",
        "id": "VHN-113348"
      },
      {
        "date": "2017-02-24T00:00:00",
        "db": "VULMON",
        "id": "CVE-2017-5145"
      },
      {
        "date": "2017-01-23T04:05:00",
        "db": "BID",
        "id": "95411"
      },
      {
        "date": "2017-03-14T00:00:00",
        "db": "JVNDB",
        "id": "JVNDB-2017-001714"
      },
      {
        "date": "2017-01-13T00:00:00",
        "db": "CNNVD",
        "id": "CNNVD-201701-324"
      },
      {
        "date": "2024-11-21T03:27:08.970000",
        "db": "NVD",
        "id": "CVE-2017-5145"
      }
    ]
  },
  "threat_type": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/threat_type#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "remote",
    "sources": [
      {
        "db": "CNNVD",
        "id": "CNNVD-201701-324"
      }
    ],
    "trust": 0.6
  },
  "title": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/title#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "Carlo Gavazzi VMU-C EM and  VMU-C PV Firmware cross-site request forgery vulnerability",
    "sources": [
      {
        "db": "JVNDB",
        "id": "JVNDB-2017-001714"
      }
    ],
    "trust": 0.8
  },
  "type": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/type#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "cross-site request forgery",
    "sources": [
      {
        "db": "CNNVD",
        "id": "CNNVD-201701-324"
      }
    ],
    "trust": 0.6
  }
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
  • Confirmed: The vulnerability is confirmed from an analyst perspective.
  • Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
  • Patched: This vulnerability was successfully patched by the user reporting the sighting.
  • Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
  • Not confirmed: The user expresses doubt about the veracity of the vulnerability.
  • Not patched: This vulnerability was not successfully patched by the user reporting the sighting.


Loading…