SecurityTracker.com
Keep Track of the Latest Vulnerabilities
with SecurityTracker!
    Home    |    View Topics    |    Search    |    Contact Us    |   

SecurityTracker
Archives


 
Sign Up
Sign Up for Your FREE Weekly SecurityTracker E-mail Alert Summary
Instant Alerts
Buy our Premium Vulnerability Notification Service to receive customized, instant alerts
Affiliates
Put SecurityTracker Vulnerability Alerts on Your Web Site -- It's Free!
Partners
Become a Partner and License Our Database or Notification Service
Report a Bug
Report a vulnerability that you have found to SecurityTracker
bugs
@
securitytracker.com






Category:   Device (Embedded Server/Appliance)  >   APC Devices Vendors:   American Power Conversion Corp.
APC Switched Rack Power Distribution Units Grant Limited Access to Remote Users
SecurityTracker Alert ID:  1019018
SecurityTracker URL:  http://securitytracker.com/id/1019018
CVE Reference:   CVE-2007-6226   (Links to External Site)
Updated:  Jan 4 2008
Original Entry Date:  Nov 29 2007
Impact:   User access via network
Vendor Confirmed:  Yes  Exploit Included:  Yes  
Version(s): RPDU 3.5.5, AOS 3.5.6; tested on Model AP7932; Affects AP79xx and APC-MGE devices
Description:   A vulnerability was reported in the APC Switched Rack PDUs. A remote user can gain limited access to the management interface in certain cases.

A remote user can attempt to login when a valid user is already logged in to the system. When the valid user logs out of the system, the remote user can refresh their web connection to gain access to the management interface with the privileges of the previous user for only certain user types.

Only the Outlet User type on the rPDU devices (AP79xx) and Read Only user type on all APC-MGE devices are affected.

The Admin and Device user types are not affected.

The vendor was notified on November 28, 2007.

Gary Simat of Total Server Solutions LLC and Randy Kent of Sevaa Group Inc. reported this vulnerability.

[Editor's note: The vendor disputes the original report as inaccurate and indicates that the vulnerability is more narrowly scoped than originally reported.]

Impact:   A remote user can gain access to certain types of accounts on the management interface in certain cases.
Solution:   No solution was available at the time of this entry.

The vendor is working on a fix.

The APC advisory is available at:

http://nam-en.apc.com/cgi-bin/nam_en.cfg/php/enduser/std_adp.php?p_faqid=8965

Vendor URL:  nam-en.apc.com/cgi-bin/nam_en.cfg/php/enduser/std_adp.php?p_faqid=8965 (Links to External Site)
Cause:   Authentication error
Underlying OS:  

Message History:   None.


 Source Message Contents

Date:  29 Nov 2007 14:41:38 -0000
Subject:  APC Management Vulnerability

We have found a security exploit in the latest APC firmware versions for there switched rack PDU products. We have only tested this
 against the version listed below on a AP7932 0u 30amp PDU.

Name: 	rpdu
Version: 	v3.5.5
Date: 	07/18/2007
Time: 	11:38:29

Name: 	aos
Version: 	v3.5.6
Date: 	07/18/2007
Time: 	10:24:55
Date Reported to APC: 11-28-2007

Discovered by: 
Gary Simat of Total Server Solutions LLC
Randy Kent of Sevaa Group Inc

Steps to reproduce:
1) login to the APC as a user from computer 1
2) Then attempt to login from another computer (we will call this computer 2), the User Name and Password will not be editable, so
 just click Log On. It will say someone is already logged in. leave this page up.
3) logout of computer 1
4) simply hit refresh on computer 2 and select to resend the headers. you will be logged in as the previously authenticated user.

 
 


Go to the Top of This SecurityTracker Archive Page





Home   |    View Topics   |    Search   |    Contact Us

Copyright 2014, SecurityGlobal.net LLC