
CVE-2017-9965 Scanner
CVE-2017-9965 Scanner - Directory Traversal vulnerability in Schneider Electric Pelco VideoXpert Enterprise
Short Info
Level
Single Scan
Single Scan
Can be used by
Asset Owner
Estimated Time
10 seconds
Time Interval
17 days 15 hours
Scan only one
URL
Toolbox
-
Schneider Electric Pelco VideoXpert Enterprise is a sophisticated video management software used in various industries for security surveillance and monitoring. It is primarily deployed in sectors that require large-scale video surveillance systems, such as airports, casinos, and manufacturing plants. The software serves as a platform to manage video footage from numerous cameras, ensuring comprehensive security coverage. Its architecture supports seamless integration with existing security measures and hardware, found useful by security professionals seeking scalable solutions. The enterprise version brings advanced capabilities to manage and analyze video data across multiple locations, making it indispensable for large institutions. Customers rely on it for integrating, viewing, and recording video feed securely and efficiently.
The vulnerability in question is a Directory Traversal flaw found in Schneider Electric's Pelco VideoXpert Enterprise. It compromises the server's integrity by allowing unauthorized file viewing on the web server. Specifically, this vulnerability arises due to insufficient input validation which malicious actors exploit to traverse directories. The risk is exacerbated as no authentication is required to execute the exploit, thereby making unauthorized access to sensitive files possible. Proper caution should be exercised with systems running on version 2.0 or prior. By designing a meticulous path, attackers can gain access to configuration files and sensitive information unnoticed. This vulnerability poses significant security threats and data privacy concerns.
Technical exploitation involves manipulating URLs to access unintended directories, as demonstrated in the template's vulnerable endpoint. The rogue URL uses double-dot-slash sequences to bypass standard directory restrictions. Specifically, the vulnerable endpoint is accessed via manipulated GET requests that include path sequences to navigate up the directory hierarchy. Once executed, it reveals sensitive server files, such as configuration and log files. This technique exploits poor input validation processes, prompting unauthorized directory access. The exploitation method is straightforward, given prior knowledge of the vulnerable path structure and accessible files. Ensuring robust path sanitization mechanisms can prevent such exploits from compromising server integrity.
Exploitation of this vulnerability may lead to unauthorized access to sensitive files, potentially revealing critical information about the server and its configuration. It could result in data breach scenarios where confidential data is accessed or extracted by unauthorized individuals. Furthermore, attackers could leverage accessed files to identify other exploitable vulnerabilities within the system. Continuous unauthorized access may also lead to operability issues, where server performance is hampered due to malicious activity. Long-term unmitigated exposure could escalate into more severe security situations, including system infiltrations or data tampering. Therefore, addressing such vulnerabilities quickly is imperative to safeguard system integrity.
REFERENCES
- https://packetstormsecurity.com/files/143317/Schneider-Electric-Pelco-VideoXpert-Core-Admin-Portal-Directory-Traversal.html
- https://www.zeroscience.mk/en/vulnerabilities/ZSL-2017-5419.php
- https://ics-cert.us-cert.gov/advisories/ICSA-17-355-02
- https://www.schneider-electric.com/en/download/document/SEVD-2017-339-01/