CVE-2018-7835 – Schneider Electric IIoT Monitor downloadCSV Directory Traversal Information Disclosure Vulnerability
https://notcve.org/view.php?id=CVE-2018-7835
An Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') vulnerability exists in IIoT Monitor 3.1.38 which could allow access to files available to SYSTEM user. Existe una vulnerabilidad de limitación incorrecta de un nombre de ruta en un directorio restringido ("salto de directorio") en IIoT Monitor 3.1.38, lo que podría permitir el acceso a archivos disponibles para el usuario SYSTEM. This vulnerability allows remote attackers to disclose sensitive information on vulnerable installations of Schneider Electric IIoT Monitor. Authentication is not required to exploit this vulnerability. The specific flaw exists within downloadCSV.jsp servlet. The issue results from the lack of proper validation of a user-supplied path prior to using it in file operations. • http://www.securityfocus.com/bid/106484 https://www.schneider-electric.com/en/download/document/SEVD-2018-354-03 • CWE-22: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') •
CVE-2018-7837 – Schneider Electric IIoT Monitor RuleMgmt addRule XML External Entity Processing Information Disclosure Vulnerability
https://notcve.org/view.php?id=CVE-2018-7837
An Improper Restriction of XML External Entity Reference ('XXE') vulnerability exists on numerous methods of the IIoT Monitor 3.1.38 software that could allow the software to resolve documents outside of the intended sphere of control, causing the software to embed incorrect documents into its output and expose restricted information. Existe una vulnerabilidad de restricción incorrecta de XEE (XML External Entity) en numerosos métodos del software de IIoT Monitor 3.1.38 que podría permitir que el software resuelva documentos fuera de la esfera de control planeada, provocando que el software embeba documentos incorrectos en su entrada y exponga información restringida. This vulnerability allows remote attackers to disclose sensitive information on vulnerable installations of Schneider Electric IIoT Monitor. Authentication is not required to exploit this vulnerability. The specific flaw exists in the addRule method of the RuleMgmt servlet. Due to the improper restriction of XML External Entity (XXE) references, a specially crafted document specifying a URI causes the XML parser to access the URI and embed the contents back into the XML document for further processing. • http://www.securityfocus.com/bid/106484 https://www.schneider-electric.com/en/download/document/SEVD-2018-354-03 • CWE-611: Improper Restriction of XML External Entity Reference •