Vulnerabilites related to Dell EMC - Integrated Data Protection Appliance
CVE-2018-11076 (GCVE-0-2018-11076)
Vulnerability from cvelistv5
Published
2018-11-26 20:00
Modified
2024-09-16 20:32
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- Remote Code Execution Vulnerability
Summary
Dell EMC Avamar Server versions 7.2.0, 7.2.1, 7.3.0, 7.3.1, 7.4.0 and 7.4.1 and Dell EMC Integrated Data Protection Appliance (IDPA) 2.0 are affected by an information exposure vulnerability. Avamar Java management console's SSL/TLS private key may be leaked in the Avamar Java management client package. The private key could potentially be used by an unauthenticated attacker on the same data-link layer to initiate a MITM attack on management console users.
References
► | URL | Tags | ||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
Impacted products
Vendor | Product | Version | |||||||
---|---|---|---|---|---|---|---|---|---|
► | Dell EMC | Avamar |
Version: 7.2.0 Version: 7.2.1 Version: 7.3.0 Version: 7.3.1 Version: 7.4.0 Version: 7.4.1 |
||||||
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-05T07:54:36.567Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "20181120 DSA-2018-154: Dell EMC Avamar and Integrated Data Protection Appliance Information Exposure Vulnerability", "tags": [ "mailing-list", "x_refsource_FULLDISC", "x_transferred" ], "url": "https://seclists.org/fulldisclosure/2018/Nov/50" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://www.vmware.com/security/advisories/VMSA-2018-0029.html" }, { "name": "105972", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/105972" }, { "name": "1042153", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://www.securitytracker.com/id/1042153" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "Avamar", "vendor": "Dell EMC", "versions": [ { "status": "affected", "version": "7.2.0" }, { "status": "affected", "version": "7.2.1" }, { "status": "affected", "version": "7.3.0" }, { "status": "affected", "version": "7.3.1" }, { "status": "affected", "version": "7.4.0" }, { "status": "affected", "version": "7.4.1" } ] }, { "product": "Integrated Data Protection Appliance", "vendor": "Dell EMC", "versions": [ { "status": "affected", "version": "2.0" } ] } ], "datePublic": "2018-11-20T00:00:00", "descriptions": [ { "lang": "en", "value": "Dell EMC Avamar Server versions 7.2.0, 7.2.1, 7.3.0, 7.3.1, 7.4.0 and 7.4.1 and Dell EMC Integrated Data Protection Appliance (IDPA) 2.0 are affected by an information exposure vulnerability. Avamar Java management console\u0027s SSL/TLS private key may be leaked in the Avamar Java management client package. The private key could potentially be used by an unauthenticated attacker on the same data-link layer to initiate a MITM attack on management console users." } ], "problemTypes": [ { "descriptions": [ { "description": "Remote Code Execution Vulnerability", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2018-11-27T16:57:01", "orgId": "c550e75a-17ff-4988-97f0-544cde3820fe", "shortName": "dell" }, "references": [ { "name": "20181120 DSA-2018-154: Dell EMC Avamar and Integrated Data Protection Appliance Information Exposure Vulnerability", "tags": [ "mailing-list", "x_refsource_FULLDISC" ], "url": "https://seclists.org/fulldisclosure/2018/Nov/50" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://www.vmware.com/security/advisories/VMSA-2018-0029.html" }, { "name": "105972", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/105972" }, { "name": "1042153", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://www.securitytracker.com/id/1042153" } ], "source": { "discovery": "UNKNOWN" }, "title": "Dell EMC Avamar and Integrated Data Protection Appliance Information Exposure Vulnerability", "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "security_alert@emc.com", "DATE_PUBLIC": "2018-11-20T05:00:00.000Z", "ID": "CVE-2018-11076", "STATE": "PUBLIC", "TITLE": "Dell EMC Avamar and Integrated Data Protection Appliance Information Exposure Vulnerability" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Avamar", "version": { "version_data": [ { "affected": "=", "version_affected": "=", "version_value": "7.2.0" }, { "affected": "=", "version_affected": "=", "version_value": "7.2.1" }, { "affected": "=", "version_affected": "=", "version_value": "7.3.0" }, { "affected": "=", "version_affected": "=", "version_value": "7.3.1" }, { "affected": "=", "version_affected": "=", "version_value": "7.4.0" }, { "affected": "=", "version_affected": "=", "version_value": "7.4.1" } ] } }, { "product_name": "Integrated Data Protection Appliance", "version": { "version_data": [ { "affected": "=", "version_affected": "=", "version_value": "2.0" } ] } } ] }, "vendor_name": "Dell EMC" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Dell EMC Avamar Server versions 7.2.0, 7.2.1, 7.3.0, 7.3.1, 7.4.0 and 7.4.1 and Dell EMC Integrated Data Protection Appliance (IDPA) 2.0 are affected by an information exposure vulnerability. Avamar Java management console\u0027s SSL/TLS private key may be leaked in the Avamar Java management client package. The private key could potentially be used by an unauthenticated attacker on the same data-link layer to initiate a MITM attack on management console users." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Remote Code Execution Vulnerability" } ] } ] }, "references": { "reference_data": [ { "name": "20181120 DSA-2018-154: Dell EMC Avamar and Integrated Data Protection Appliance Information Exposure Vulnerability", "refsource": "FULLDISC", "url": "https://seclists.org/fulldisclosure/2018/Nov/50" }, { "name": "https://www.vmware.com/security/advisories/VMSA-2018-0029.html", "refsource": "CONFIRM", "url": "https://www.vmware.com/security/advisories/VMSA-2018-0029.html" }, { "name": "105972", "refsource": "BID", "url": "http://www.securityfocus.com/bid/105972" }, { "name": "1042153", "refsource": "SECTRACK", "url": "http://www.securitytracker.com/id/1042153" } ] }, "source": { "discovery": "UNKNOWN" } } } }, "cveMetadata": { "assignerOrgId": "c550e75a-17ff-4988-97f0-544cde3820fe", "assignerShortName": "dell", "cveId": "CVE-2018-11076", "datePublished": "2018-11-26T20:00:00Z", "dateReserved": "2018-05-14T00:00:00", "dateUpdated": "2024-09-16T20:32:06.321Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2018-11062 (GCVE-0-2018-11062)
Vulnerability from cvelistv5
Published
2018-11-02 22:00
Modified
2024-09-16 18:04
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- Dell EMC Integrated Data Protection Appliance Undocumented Accounts Vulnerability
Summary
Integrated Data Protection Appliance versions 2.0, 2.1, and 2.2 contain undocumented accounts named 'support' and 'admin' that are protected with default passwords. These accounts have limited privileges and can access certain system files only. A malicious user with the knowledge of the default passwords may potentially log in to the system and gain read and write access to certain system files.
References
► | URL | Tags | ||||||
---|---|---|---|---|---|---|---|---|
|
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
Dell EMC | Integrated Data Protection Appliance |
Version: 2.X < 2.3 |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-05T07:54:36.804Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "20181029 DSA-2018-136: Dell EMC Integrated Data Protection Appliance Undocumented Accounts Vulnerability", "tags": [ "mailing-list", "x_refsource_FULLDISC", "x_transferred" ], "url": "https://seclists.org/fulldisclosure/2018/Oct/53" }, { "name": "105764", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/105764" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "Integrated Data Protection Appliance", "vendor": "Dell EMC", "versions": [ { "lessThan": "2.3", "status": "affected", "version": "2.X", "versionType": "custom" } ] } ], "datePublic": "2018-10-29T00:00:00", "descriptions": [ { "lang": "en", "value": "Integrated Data Protection Appliance versions 2.0, 2.1, and 2.2 contain undocumented accounts named \u0027support\u0027 and \u0027admin\u0027 that are protected with default passwords. These accounts have limited privileges and can access certain system files only. A malicious user with the knowledge of the default passwords may potentially log in to the system and gain read and write access to certain system files." } ], "problemTypes": [ { "descriptions": [ { "description": "Dell EMC Integrated Data Protection Appliance Undocumented Accounts Vulnerability", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2018-11-03T09:57:01", "orgId": "c550e75a-17ff-4988-97f0-544cde3820fe", "shortName": "dell" }, "references": [ { "name": "20181029 DSA-2018-136: Dell EMC Integrated Data Protection Appliance Undocumented Accounts Vulnerability", "tags": [ "mailing-list", "x_refsource_FULLDISC" ], "url": "https://seclists.org/fulldisclosure/2018/Oct/53" }, { "name": "105764", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/105764" } ], "source": { "discovery": "UNKNOWN" }, "title": "Dell EMC Integrated Data Protection Appliance Undocumented Accounts Vulnerability", "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "security_alert@emc.com", "DATE_PUBLIC": "2018-10-29T16:00:00.000Z", "ID": "CVE-2018-11062", "STATE": "PUBLIC", "TITLE": "Dell EMC Integrated Data Protection Appliance Undocumented Accounts Vulnerability" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Integrated Data Protection Appliance", "version": { "version_data": [ { "affected": "\u003c", "version_affected": "\u003c", "version_name": "2.X", "version_value": "2.3" } ] } } ] }, "vendor_name": "Dell EMC" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Integrated Data Protection Appliance versions 2.0, 2.1, and 2.2 contain undocumented accounts named \u0027support\u0027 and \u0027admin\u0027 that are protected with default passwords. These accounts have limited privileges and can access certain system files only. A malicious user with the knowledge of the default passwords may potentially log in to the system and gain read and write access to certain system files." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Dell EMC Integrated Data Protection Appliance Undocumented Accounts Vulnerability" } ] } ] }, "references": { "reference_data": [ { "name": "20181029 DSA-2018-136: Dell EMC Integrated Data Protection Appliance Undocumented Accounts Vulnerability", "refsource": "FULLDISC", "url": "https://seclists.org/fulldisclosure/2018/Oct/53" }, { "name": "105764", "refsource": "BID", "url": "http://www.securityfocus.com/bid/105764" } ] }, "source": { "discovery": "UNKNOWN" } } } }, "cveMetadata": { "assignerOrgId": "c550e75a-17ff-4988-97f0-544cde3820fe", "assignerShortName": "dell", "cveId": "CVE-2018-11062", "datePublished": "2018-11-02T22:00:00Z", "dateReserved": "2018-05-14T00:00:00", "dateUpdated": "2024-09-16T18:04:27.800Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2018-11048 (GCVE-0-2018-11048)
Vulnerability from cvelistv5
Published
2018-08-10 20:00
Modified
2024-09-17 01:56
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- XML External Entity Vulnerability
Summary
Dell EMC Data Protection Advisor, versions 6.2, 6,3, 6.4, 6.5 and Dell EMC Integrated Data Protection Appliance (IDPA) versions 2.0, 2.1 contain a XML External Entity (XXE) Injection vulnerability in the REST API. An authenticated remote malicious user could potentially exploit this vulnerability to read certain system files in the server or cause denial of service by supplying specially crafted Document Type Definitions (DTDs) in an XML request.
References
► | URL | Tags | |||||||||
---|---|---|---|---|---|---|---|---|---|---|---|
|
Impacted products
Vendor | Product | Version | |||||||
---|---|---|---|---|---|---|---|---|---|
► | Dell EMC | Data Protection Advisor |
Version: 6.2 Version: 6.3 Version: 6.4 < Version: 6.5 < |
||||||
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-05T07:54:36.495Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "105130", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/105130" }, { "name": "20180803 DSA-2018-112: Dell EMC Data Protection Advisor XML External Entity Vulnerability", "tags": [ "mailing-list", "x_refsource_FULLDISC", "x_transferred" ], "url": "http://seclists.org/fulldisclosure/2018/Aug/5" }, { "name": "1041417", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://www.securitytracker.com/id/1041417" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "Data Protection Advisor", "vendor": "Dell EMC", "versions": [ { "status": "affected", "version": "6.2" }, { "status": "affected", "version": "6.3" }, { "lessThanOrEqual": "patch B180", "status": "affected", "version": "6.4", "versionType": "custom" }, { "lessThanOrEqual": "patch B58", "status": "affected", "version": "6.5", "versionType": "custom" } ] }, { "product": "Integrated Data Protection Appliance", "vendor": "Dell EMC", "versions": [ { "status": "affected", "version": "2.0" }, { "status": "affected", "version": "2.1" } ] } ], "datePublic": "2018-08-03T00:00:00", "descriptions": [ { "lang": "en", "value": "Dell EMC Data Protection Advisor, versions 6.2, 6,3, 6.4, 6.5 and Dell EMC Integrated Data Protection Appliance (IDPA) versions 2.0, 2.1 contain a XML External Entity (XXE) Injection vulnerability in the REST API. An authenticated remote malicious user could potentially exploit this vulnerability to read certain system files in the server or cause denial of service by supplying specially crafted Document Type Definitions (DTDs) in an XML request." } ], "problemTypes": [ { "descriptions": [ { "description": "XML External Entity Vulnerability", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2018-08-24T09:57:01", "orgId": "c550e75a-17ff-4988-97f0-544cde3820fe", "shortName": "dell" }, "references": [ { "name": "105130", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/105130" }, { "name": "20180803 DSA-2018-112: Dell EMC Data Protection Advisor XML External Entity Vulnerability", "tags": [ "mailing-list", "x_refsource_FULLDISC" ], "url": "http://seclists.org/fulldisclosure/2018/Aug/5" }, { "name": "1041417", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://www.securitytracker.com/id/1041417" } ], "source": { "discovery": "UNKNOWN" }, "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "security_alert@emc.com", "DATE_PUBLIC": "2018-08-03T04:00:00.000Z", "ID": "CVE-2018-11048", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Data Protection Advisor", "version": { "version_data": [ { "affected": "=", "version_affected": "=", "version_value": "6.2" }, { "affected": "=", "version_affected": "=", "version_value": "6.3" }, { "affected": "\u003c=", "version_affected": "\u003c=", "version_name": "6.4", "version_value": "patch B180" }, { "affected": "\u003c=", "version_affected": "\u003c=", "version_name": "6.5", "version_value": "patch B58" } ] } }, { "product_name": "Integrated Data Protection Appliance", "version": { "version_data": [ { "affected": "=", "version_affected": "=", "version_value": "2.0" }, { "affected": "=", "version_affected": "=", "version_value": "2.1" } ] } } ] }, "vendor_name": "Dell EMC" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Dell EMC Data Protection Advisor, versions 6.2, 6,3, 6.4, 6.5 and Dell EMC Integrated Data Protection Appliance (IDPA) versions 2.0, 2.1 contain a XML External Entity (XXE) Injection vulnerability in the REST API. An authenticated remote malicious user could potentially exploit this vulnerability to read certain system files in the server or cause denial of service by supplying specially crafted Document Type Definitions (DTDs) in an XML request." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "XML External Entity Vulnerability" } ] } ] }, "references": { "reference_data": [ { "name": "105130", "refsource": "BID", "url": "http://www.securityfocus.com/bid/105130" }, { "name": "20180803 DSA-2018-112: Dell EMC Data Protection Advisor XML External Entity Vulnerability", "refsource": "FULLDISC", "url": "http://seclists.org/fulldisclosure/2018/Aug/5" }, { "name": "1041417", "refsource": "SECTRACK", "url": "http://www.securitytracker.com/id/1041417" } ] }, "source": { "discovery": "UNKNOWN" } } } }, "cveMetadata": { "assignerOrgId": "c550e75a-17ff-4988-97f0-544cde3820fe", "assignerShortName": "dell", "cveId": "CVE-2018-11048", "datePublished": "2018-08-10T20:00:00Z", "dateReserved": "2018-05-14T00:00:00", "dateUpdated": "2024-09-17T01:56:30.207Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2018-11067 (GCVE-0-2018-11067)
Vulnerability from cvelistv5
Published
2018-11-26 20:00
Modified
2024-09-17 00:11
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- Open Redirection Vulnerability
Summary
Dell EMC Avamar Client Manager in Dell EMC Avamar Server versions 7.2.0, 7.2.1, 7.3.0, 7.3.1, 7.4.0, 7.4.1, 7.5.0, 7.5.1, 18.1 and Dell EMC Integrated Data Protection Appliance (IDPA) versions 2.0, 2.1 and 2.2 contain an open redirection vulnerability. A remote unauthenticated attacker could potentially exploit this vulnerability to redirect application users to arbitrary web URLs by tricking the victim users to click on maliciously crafted links. The vulnerability could be used to conduct phishing attacks that cause users to unknowingly visit malicious sites.
References
► | URL | Tags | ||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
Impacted products
Vendor | Product | Version | |||||||
---|---|---|---|---|---|---|---|---|---|
► | Dell EMC | Avamar |
Version: 7.2.0 Version: 7.2.1 Version: 7.3.0 Version: 7.3.1 Version: 7.4.0 Version: 7.4.1 Version: 7.5.0 Version: 7.5.1 Version: 18.1 |
||||||
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-05T07:54:36.648Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "20181120 DSA-2018-145: Dell EMC Avamar Multiple Vulnerabilities", "tags": [ "mailing-list", "x_refsource_FULLDISC", "x_transferred" ], "url": "https://seclists.org/fulldisclosure/2018/Nov/49" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://www.vmware.com/security/advisories/VMSA-2018-0029.html" }, { "name": "105969", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/105969" }, { "name": "1042153", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://www.securitytracker.com/id/1042153" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "Avamar", "vendor": "Dell EMC", "versions": [ { "status": "affected", "version": "7.2.0" }, { "status": "affected", "version": "7.2.1" }, { "status": "affected", "version": "7.3.0" }, { "status": "affected", "version": "7.3.1" }, { "status": "affected", "version": "7.4.0" }, { "status": "affected", "version": "7.4.1" }, { "status": "affected", "version": "7.5.0" }, { "status": "affected", "version": "7.5.1" }, { "status": "affected", "version": "18.1" } ] }, { "product": "Integrated Data Protection Appliance", "vendor": "Dell EMC", "versions": [ { "status": "affected", "version": "2.0" }, { "status": "affected", "version": "2.1" }, { "status": "affected", "version": "2.2" } ] } ], "datePublic": "2018-11-20T00:00:00", "descriptions": [ { "lang": "en", "value": "Dell EMC Avamar Client Manager in Dell EMC Avamar Server versions 7.2.0, 7.2.1, 7.3.0, 7.3.1, 7.4.0, 7.4.1, 7.5.0, 7.5.1, 18.1 and Dell EMC Integrated Data Protection Appliance (IDPA) versions 2.0, 2.1 and 2.2 contain an open redirection vulnerability. A remote unauthenticated attacker could potentially exploit this vulnerability to redirect application users to arbitrary web URLs by tricking the victim users to click on maliciously crafted links. The vulnerability could be used to conduct phishing attacks that cause users to unknowingly visit malicious sites." } ], "problemTypes": [ { "descriptions": [ { "description": "Open Redirection Vulnerability", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2018-11-27T16:57:01", "orgId": "c550e75a-17ff-4988-97f0-544cde3820fe", "shortName": "dell" }, "references": [ { "name": "20181120 DSA-2018-145: Dell EMC Avamar Multiple Vulnerabilities", "tags": [ "mailing-list", "x_refsource_FULLDISC" ], "url": "https://seclists.org/fulldisclosure/2018/Nov/49" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://www.vmware.com/security/advisories/VMSA-2018-0029.html" }, { "name": "105969", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/105969" }, { "name": "1042153", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://www.securitytracker.com/id/1042153" } ], "source": { "discovery": "UNKNOWN" }, "title": "Dell EMC Avamar and Integrated Data Protection Appliance Open Redirection Vulnerability", "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "security_alert@emc.com", "DATE_PUBLIC": "2018-11-20T05:00:00.000Z", "ID": "CVE-2018-11067", "STATE": "PUBLIC", "TITLE": "Dell EMC Avamar and Integrated Data Protection Appliance Open Redirection Vulnerability" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Avamar", "version": { "version_data": [ { "affected": "=", "version_affected": "=", "version_value": "7.2.0" }, { "affected": "=", "version_affected": "=", "version_value": "7.2.1" }, { "affected": "=", "version_affected": "=", "version_value": "7.3.0" }, { "affected": "=", "version_affected": "=", "version_value": "7.3.1" }, { "affected": "=", "version_affected": "=", "version_value": "7.4.0" }, { "affected": "=", "version_affected": "=", "version_value": "7.4.1" }, { "version_value": "7.5.0" }, { "version_value": "7.5.1" }, { "version_value": "18.1" } ] } }, { "product_name": "Integrated Data Protection Appliance", "version": { "version_data": [ { "affected": "=", "version_affected": "=", "version_value": "2.0" }, { "affected": "=", "version_affected": "=", "version_value": "2.1" }, { "affected": "=", "version_affected": "=", "version_value": "2.2" } ] } } ] }, "vendor_name": "Dell EMC" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Dell EMC Avamar Client Manager in Dell EMC Avamar Server versions 7.2.0, 7.2.1, 7.3.0, 7.3.1, 7.4.0, 7.4.1, 7.5.0, 7.5.1, 18.1 and Dell EMC Integrated Data Protection Appliance (IDPA) versions 2.0, 2.1 and 2.2 contain an open redirection vulnerability. A remote unauthenticated attacker could potentially exploit this vulnerability to redirect application users to arbitrary web URLs by tricking the victim users to click on maliciously crafted links. The vulnerability could be used to conduct phishing attacks that cause users to unknowingly visit malicious sites." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Open Redirection Vulnerability" } ] } ] }, "references": { "reference_data": [ { "name": "20181120 DSA-2018-145: Dell EMC Avamar Multiple Vulnerabilities", "refsource": "FULLDISC", "url": "https://seclists.org/fulldisclosure/2018/Nov/49" }, { "name": "https://www.vmware.com/security/advisories/VMSA-2018-0029.html", "refsource": "CONFIRM", "url": "https://www.vmware.com/security/advisories/VMSA-2018-0029.html" }, { "name": "105969", "refsource": "BID", "url": "http://www.securityfocus.com/bid/105969" }, { "name": "1042153", "refsource": "SECTRACK", "url": "http://www.securitytracker.com/id/1042153" } ] }, "source": { "discovery": "UNKNOWN" } } } }, "cveMetadata": { "assignerOrgId": "c550e75a-17ff-4988-97f0-544cde3820fe", "assignerShortName": "dell", "cveId": "CVE-2018-11067", "datePublished": "2018-11-26T20:00:00Z", "dateReserved": "2018-05-14T00:00:00", "dateUpdated": "2024-09-17T00:11:44.344Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2018-11066 (GCVE-0-2018-11066)
Vulnerability from cvelistv5
Published
2018-11-26 20:00
Modified
2024-09-17 03:43
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- Remote Code Execution Vulnerability
Summary
Dell EMC Avamar Client Manager in Dell EMC Avamar Server versions 7.2.0, 7.2.1, 7.3.0, 7.3.1, 7.4.0, 7.4.1, 7.5.0, 7.5.1, 18.1 and Dell EMC Integrated Data Protection Appliance (IDPA) versions 2.0, 2.1 and 2.2 contain a Remote Code Execution vulnerability. A remote unauthenticated attacker could potentially exploit this vulnerability to execute arbitrary commands on the server.
References
► | URL | Tags | ||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
Impacted products
Vendor | Product | Version | |||||||
---|---|---|---|---|---|---|---|---|---|
► | Dell EMC | Avamar |
Version: 7.2.0 Version: 7.2.1 Version: 7.3.0 Version: 7.3.1 Version: 7.4.0 Version: 7.4.1 Version: 7.5.0 Version: 7.5.1 Version: 18.1 |
||||||
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-05T07:54:36.502Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "105968", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/105968" }, { "name": "20181120 DSA-2018-145: Dell EMC Avamar Multiple Vulnerabilities", "tags": [ "mailing-list", "x_refsource_FULLDISC", "x_transferred" ], "url": "https://seclists.org/fulldisclosure/2018/Nov/49" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://www.vmware.com/security/advisories/VMSA-2018-0029.html" }, { "name": "1042153", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://www.securitytracker.com/id/1042153" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "Avamar", "vendor": "Dell EMC", "versions": [ { "status": "affected", "version": "7.2.0" }, { "status": "affected", "version": "7.2.1" }, { "status": "affected", "version": "7.3.0" }, { "status": "affected", "version": "7.3.1" }, { "status": "affected", "version": "7.4.0" }, { "status": "affected", "version": "7.4.1" }, { "status": "affected", "version": "7.5.0" }, { "status": "affected", "version": "7.5.1" }, { "status": "affected", "version": "18.1" } ] }, { "product": "Integrated Data Protection Appliance", "vendor": "Dell EMC", "versions": [ { "status": "affected", "version": "2.0" }, { "status": "affected", "version": "2.1" }, { "status": "affected", "version": "2.2" } ] } ], "datePublic": "2018-11-20T00:00:00", "descriptions": [ { "lang": "en", "value": "Dell EMC Avamar Client Manager in Dell EMC Avamar Server versions 7.2.0, 7.2.1, 7.3.0, 7.3.1, 7.4.0, 7.4.1, 7.5.0, 7.5.1, 18.1 and Dell EMC Integrated Data Protection Appliance (IDPA) versions 2.0, 2.1 and 2.2 contain a Remote Code Execution vulnerability. A remote unauthenticated attacker could potentially exploit this vulnerability to execute arbitrary commands on the server." } ], "problemTypes": [ { "descriptions": [ { "description": "Remote Code Execution Vulnerability", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2018-11-27T16:57:01", "orgId": "c550e75a-17ff-4988-97f0-544cde3820fe", "shortName": "dell" }, "references": [ { "name": "105968", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/105968" }, { "name": "20181120 DSA-2018-145: Dell EMC Avamar Multiple Vulnerabilities", "tags": [ "mailing-list", "x_refsource_FULLDISC" ], "url": "https://seclists.org/fulldisclosure/2018/Nov/49" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://www.vmware.com/security/advisories/VMSA-2018-0029.html" }, { "name": "1042153", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://www.securitytracker.com/id/1042153" } ], "source": { "discovery": "UNKNOWN" }, "title": "Dell EMC Avamar and Integrated Data Protection Appliance Remote Code Execution Vulnerability", "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "security_alert@emc.com", "DATE_PUBLIC": "2018-11-20T05:00:00.000Z", "ID": "CVE-2018-11066", "STATE": "PUBLIC", "TITLE": "Dell EMC Avamar and Integrated Data Protection Appliance Remote Code Execution Vulnerability" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Avamar", "version": { "version_data": [ { "affected": "=", "version_affected": "=", "version_value": "7.2.0" }, { "affected": "=", "version_affected": "=", "version_value": "7.2.1" }, { "affected": "=", "version_affected": "=", "version_value": "7.3.0" }, { "affected": "=", "version_affected": "=", "version_value": "7.3.1" }, { "affected": "=", "version_affected": "=", "version_value": "7.4.0" }, { "affected": "=", "version_affected": "=", "version_value": "7.4.1" }, { "version_value": "7.5.0" }, { "version_value": "7.5.1" }, { "version_value": "18.1" } ] } }, { "product_name": "Integrated Data Protection Appliance", "version": { "version_data": [ { "affected": "=", "version_affected": "=", "version_value": "2.0" }, { "affected": "=", "version_affected": "=", "version_value": "2.1" }, { "affected": "=", "version_affected": "=", "version_value": "2.2" } ] } } ] }, "vendor_name": "Dell EMC" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Dell EMC Avamar Client Manager in Dell EMC Avamar Server versions 7.2.0, 7.2.1, 7.3.0, 7.3.1, 7.4.0, 7.4.1, 7.5.0, 7.5.1, 18.1 and Dell EMC Integrated Data Protection Appliance (IDPA) versions 2.0, 2.1 and 2.2 contain a Remote Code Execution vulnerability. A remote unauthenticated attacker could potentially exploit this vulnerability to execute arbitrary commands on the server." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Remote Code Execution Vulnerability" } ] } ] }, "references": { "reference_data": [ { "name": "105968", "refsource": "BID", "url": "http://www.securityfocus.com/bid/105968" }, { "name": "20181120 DSA-2018-145: Dell EMC Avamar Multiple Vulnerabilities", "refsource": "FULLDISC", "url": "https://seclists.org/fulldisclosure/2018/Nov/49" }, { "name": "https://www.vmware.com/security/advisories/VMSA-2018-0029.html", "refsource": "CONFIRM", "url": "https://www.vmware.com/security/advisories/VMSA-2018-0029.html" }, { "name": "1042153", "refsource": "SECTRACK", "url": "http://www.securitytracker.com/id/1042153" } ] }, "source": { "discovery": "UNKNOWN" } } } }, "cveMetadata": { "assignerOrgId": "c550e75a-17ff-4988-97f0-544cde3820fe", "assignerShortName": "dell", "cveId": "CVE-2018-11066", "datePublished": "2018-11-26T20:00:00Z", "dateReserved": "2018-05-14T00:00:00", "dateUpdated": "2024-09-17T03:43:20.412Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2018-11077 (GCVE-0-2018-11077)
Vulnerability from cvelistv5
Published
2018-11-26 20:00
Modified
2024-09-17 03:06
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- Command Injection Vulnerability
Summary
'getlogs' utility in Dell EMC Avamar Server versions 7.2.0, 7.2.1, 7.3.0, 7.3.1, 7.4.0, 7.4.1, 7.5.0, 7.5.1 and 18.1 and Dell EMC Integrated Data Protection Appliance (IDPA) versions 2.0, 2.1 and 2.2 is affected by an OS command injection vulnerability. A malicious Avamar admin user may potentially be able to execute arbitrary commands under root privilege.
References
► | URL | Tags | ||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
Impacted products
Vendor | Product | Version | |||||||
---|---|---|---|---|---|---|---|---|---|
► | Dell EMC | Avamar |
Version: 7.2.0 Version: 7.2.1 Version: 7.3.0 Version: 7.3.1 Version: 7.4.0 Version: 7.4.1 Version: 7.5.0 Version: 7.5.1 Version: 18.1 |
||||||
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-05T07:54:36.485Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://www.vmware.com/security/advisories/VMSA-2018-0029.html" }, { "name": "20181120 DSA-2018-155: Dell EMC Avamar and Integrated Data Protection Appliance Command Injection Vulnerability", "tags": [ "mailing-list", "x_refsource_FULLDISC", "x_transferred" ], "url": "https://seclists.org/fulldisclosure/2018/Nov/51" }, { "name": "105971", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/105971" }, { "name": "1042153", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://www.securitytracker.com/id/1042153" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "Avamar", "vendor": "Dell EMC", "versions": [ { "status": "affected", "version": "7.2.0" }, { "status": "affected", "version": "7.2.1" }, { "status": "affected", "version": "7.3.0" }, { "status": "affected", "version": "7.3.1" }, { "status": "affected", "version": "7.4.0" }, { "status": "affected", "version": "7.4.1" }, { "status": "affected", "version": "7.5.0" }, { "status": "affected", "version": "7.5.1" }, { "status": "affected", "version": "18.1" } ] }, { "product": "Integrated Data Protection Appliance", "vendor": "Dell EMC", "versions": [ { "status": "affected", "version": "2.0" }, { "status": "affected", "version": "2.1" }, { "status": "affected", "version": "2.2" } ] } ], "datePublic": "2018-11-20T00:00:00", "descriptions": [ { "lang": "en", "value": "\u0027getlogs\u0027 utility in Dell EMC Avamar Server versions 7.2.0, 7.2.1, 7.3.0, 7.3.1, 7.4.0, 7.4.1, 7.5.0, 7.5.1 and 18.1 and Dell EMC Integrated Data Protection Appliance (IDPA) versions 2.0, 2.1 and 2.2 is affected by an OS command injection vulnerability. A malicious Avamar admin user may potentially be able to execute arbitrary commands under root privilege." } ], "problemTypes": [ { "descriptions": [ { "description": "Command Injection Vulnerability", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2018-11-27T16:57:01", "orgId": "c550e75a-17ff-4988-97f0-544cde3820fe", "shortName": "dell" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "https://www.vmware.com/security/advisories/VMSA-2018-0029.html" }, { "name": "20181120 DSA-2018-155: Dell EMC Avamar and Integrated Data Protection Appliance Command Injection Vulnerability", "tags": [ "mailing-list", "x_refsource_FULLDISC" ], "url": "https://seclists.org/fulldisclosure/2018/Nov/51" }, { "name": "105971", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/105971" }, { "name": "1042153", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://www.securitytracker.com/id/1042153" } ], "source": { "discovery": "UNKNOWN" }, "title": "Dell EMC Avamar and Integrated Data Protection Appliance Command Injection Vulnerability", "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "security_alert@emc.com", "DATE_PUBLIC": "2018-11-20T05:00:00.000Z", "ID": "CVE-2018-11077", "STATE": "PUBLIC", "TITLE": "Dell EMC Avamar and Integrated Data Protection Appliance Command Injection Vulnerability" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Avamar", "version": { "version_data": [ { "affected": "=", "version_affected": "=", "version_value": "7.2.0" }, { "affected": "=", "version_affected": "=", "version_value": "7.2.1" }, { "affected": "=", "version_affected": "=", "version_value": "7.3.0" }, { "affected": "=", "version_affected": "=", "version_value": "7.3.1" }, { "affected": "=", "version_affected": "=", "version_value": "7.4.0" }, { "affected": "=", "version_affected": "=", "version_value": "7.4.1" }, { "version_value": "7.5.0" }, { "version_value": "7.5.1" }, { "version_value": "18.1" } ] } }, { "product_name": "Integrated Data Protection Appliance", "version": { "version_data": [ { "affected": "=", "version_affected": "=", "version_value": "2.0" }, { "affected": "=", "version_affected": "=", "version_value": "2.1" }, { "affected": "=", "version_affected": "=", "version_value": "2.2" } ] } } ] }, "vendor_name": "Dell EMC" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "\u0027getlogs\u0027 utility in Dell EMC Avamar Server versions 7.2.0, 7.2.1, 7.3.0, 7.3.1, 7.4.0, 7.4.1, 7.5.0, 7.5.1 and 18.1 and Dell EMC Integrated Data Protection Appliance (IDPA) versions 2.0, 2.1 and 2.2 is affected by an OS command injection vulnerability. A malicious Avamar admin user may potentially be able to execute arbitrary commands under root privilege." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Command Injection Vulnerability" } ] } ] }, "references": { "reference_data": [ { "name": "https://www.vmware.com/security/advisories/VMSA-2018-0029.html", "refsource": "CONFIRM", "url": "https://www.vmware.com/security/advisories/VMSA-2018-0029.html" }, { "name": "20181120 DSA-2018-155: Dell EMC Avamar and Integrated Data Protection Appliance Command Injection Vulnerability", "refsource": "FULLDISC", "url": "https://seclists.org/fulldisclosure/2018/Nov/51" }, { "name": "105971", "refsource": "BID", "url": "http://www.securityfocus.com/bid/105971" }, { "name": "1042153", "refsource": "SECTRACK", "url": "http://www.securitytracker.com/id/1042153" } ] }, "source": { "discovery": "UNKNOWN" } } } }, "cveMetadata": { "assignerOrgId": "c550e75a-17ff-4988-97f0-544cde3820fe", "assignerShortName": "dell", "cveId": "CVE-2018-11077", "datePublished": "2018-11-26T20:00:00Z", "dateReserved": "2018-05-14T00:00:00", "dateUpdated": "2024-09-17T03:06:58.660Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }