SB2022121430 - Multiple vulnerabilities in Schneider Electric APC Easy UPS Online



SB2022121430 - Multiple vulnerabilities in Schneider Electric APC Easy UPS Online

Published: December 14, 2022

Security Bulletin ID SB2022121430
Severity
High
Patch available
YES
Number of vulnerabilities 4
Exploitation vector Remote access
Highest impact Code execution

Breakdown by Severity

High 50% Low 50%
  • Low
  • Medium
  • High
  • Critical

Description

This security bulletin contains information about 4 secuirty vulnerabilities.


1) Missing Authentication for Critical Function (CVE-ID: CVE-2022-42970)

The vulnerability allows a remote attacker to bypass authentication process.

The vulnerability exists due to missing authentication for the updatePassword endpoint implemented in the LoginAction.updatePassword method. A remote attacker can bypass authentication process and modify administrator passwords.


2) Arbitrary file upload (CVE-ID: CVE-2022-42971)

The vulnerability allows a remote attacker to compromise vulnerable system.

The vulnerability exists due to insufficient validation of file during file upload within the UpLoadAction.execute method. A remote attacker can upload a malicious file and execute it on the server.


3) Incorrect permission assignment for critical resource (CVE-ID: CVE-2022-42972)

The vulnerability allows a local user to escalate privileges on the system.

The vulnerability exists due to the affected application runs the Tomcat instance with SYSTEM privileges. A local user can use a specially crafted JSP file to escalate privileges and execute commands with system privileges.


4) Use of hard-coded credentials (CVE-ID: CVE-2022-42973)

The vulnerability allows a local user to gain full access to vulnerable system.

The vulnerability exists due to presence of hard-coded MySQL database credentials in application code. A local user can access the affected system using the hard-coded credentials.

Successful exploitation of this vulnerability may result in complete compromise of vulnerable system.


Remediation

Install update from vendor's website.