SB2020031313 - Multiple vunerabilities in ABB eSOMS
Published: March 13, 2020 Updated: March 13, 2020
Breakdown by Severity
- Low
- Medium
- High
- Critical
Description
This security bulletin contains information about 5 secuirty vulnerabilities.
1) Inadequate Encryption Strength (CVE-ID: CVE-2019-19097)
The vulnerability allows a remote attacker to gain access to sensitive information.
The vulnerability exists due to the affected software accept connections using medium strength ciphers. A remote attacker can eavesdrop and/or intercept the connection.
2) SQL injection (CVE-ID: CVE-2019-19094)
The vulnerability allows a remote attacker to execute arbitrary SQL queries in database.
The vulnerability exists due to insufficient sanitization of user-supplied data. A remote authenticated attacker can send a specially crafted request to the affected application and execute arbitrary SQL commands within the application database.
Successful exploitation of this vulnerability may allow a remote attacker to read, delete, modify data in database and gain complete control over the affected application.
3) Information disclosure (CVE-ID: CVE-2019-19091)
The vulnerability allows a remote attacker to gain access to potentially sensitive information.
The vulnerability exists due to the HTTPS responses contain comments with sensitive information about the application. A remote authenticated attacker can gain unauthorized access to sensitive information on the system.
4) Protection Mechanism Failure (CVE-ID: CVE-2019-19089)
The vulnerability allows a remote attacker to bypass implemented security restrictions.
The vulnerability exists due to the X-Content-Type-Options Header is missing in the HTTP response, potentially causing the response body to be interpreted and displayed as different content type other than declared. A remote attacker can execute arbitrary code via text interpreted as JavaScript.
5) Use of Web Browser Cache Containing Sensitive Information (CVE-ID: CVE-2019-19000)
The vulnerability allows a remote attacker to gain access to sensitive information on the target system.
Remediation
Install update from vendor's website.