#VU18833 Arbitrary file upload in Enterprise Building Management System and Proton Building Management System


Published: 2021-06-17

Vulnerability identifier: #VU18833

Vulnerability risk: High

CVSSv3.1: 8.9 [CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H/E:P/RL:O/RC:C]

CVE-ID: CVE-2019-7274

CWE-ID: CWE-434

Exploitation vector: Network

Exploit availability: Yes

Vulnerable software:
Enterprise Building Management System
Server applications / SCADA systems
Proton Building Management System
Server applications / SCADA systems

Vendor: Optergy

Description

The vulnerability allows a remote attacker to compromise vulnerable system.

The vulnerability exists due to to the absence of file extension validation when uploading files through the badge image upload script. A remote non-authenticated attacker can upload files with arbitrary extensions into a directory within application’s web root and execute them with privileges of the web server.

Mitigation
Install updates from vendor's website.

Vulnerable software versions

Enterprise Building Management System: 2.3.0a

Proton Building Management System: 2.3.0a


External links
http://ics-cert.us-cert.gov/advisories/ICSA-19-157-01


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote authenticated user via the Internet.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability. However, proof of concept for this vulnerability is available.


Latest bulletins with this vulnerability