Vulnerability CVE-2018-9078


Published: 2018-09-28

Description:
For some Iomega, Lenovo, LenovoEMC NAS devices versions 4.1.402.34662 and earlier, the Content Explorer application grants users the ability to upload files to shares and this image was rendered in the browser in the device's origin instead of prompting to download the asset. The application does not prevent the user from uploading SVG images and returns these images within their origin. As a result, malicious users can upload SVG images that contain arbitrary JavaScript that is evaluated when the victim issues a request to download the file.

Type:

CWE-254

(Security Features)

Vendor: Lenovo
Product: Px2-300d firmware 
Version: 4.1.402.34662;
Product: Ez media & backup center firmware 
Version: 4.1.402.34662;
Product: Storcenter px4-300d firmware 
Version: 4.1.402.34662;
Product: Storcenter ix2 firmware 
Version: 4.1.402.34662;
Product: Px4-300r firmware 
Version: 4.1.402.34662;
Product: Ix4-300d firmware 
Version: 4.1.402.34662;
Product: Storcenter px6-300d firmware 
Version: 4.1.402.34662;
Product: Storcenter px12-400r firmware 
Version: 4.1.402.34662;
Product: Px4-400r firmware 
Version: 4.1.402.34662;
Product: Px12-450r firmware 
Version: 4.1.402.34662;
Product: Storcenter px2-300d firmware 
Version: 4.1.402.34662;
Product: Storcenter ix2-dl firmware 
Version: 4.1.402.34662;
Product: Px4-300d firmware 
Version: 4.1.402.34662;
Product: Ix2 firmware 
Version: 4.1.402.34662;
Product: Storcenter px4-300r firmware 
Version: 4.1.402.34662;
Product: Storcenter ix4-300d firmware 
Version: 4.1.402.34662;
Product: Px4-400d firmware 
Version: 4.1.402.34662;
Product: Px12-400r firmware 
Version: 4.1.402.34662;
Product: Storcenter px12-450r firmware 
Version: 4.1.402.34662;
Product: Px6-300d firmware 
Version: 4.1.402.34662;

CVSS2 => (AV:N/AC:M/Au:N/C:P/I:P/A:P)

CVSS Base Score
Impact Subscore
Exploitability Subscore
6.8/10
6.4/10
8.6/10
Exploit range
Attack complexity
Authentication
Remote
Medium
No required
Confidentiality impact
Integrity impact
Availability impact
Partial
Partial
Partial

 References:
https://support.lenovo.com/us/en/solutions/LEN-24224

Related CVE
CVE-2019-6163
A denial of service vulnerability was reported in Lenovo System Update before version 5.07.0084 that could allow log files to be written to non-standard locations.
CVE-2019-6158
An internal product security audit of Lenovo XClarity Administrator (LXCA) discovered HTTP proxy credentials being written to a log file in clear text. This only affects LXCA when HTTP proxy credentials have been configured. This affects LXCA version...
CVE-2019-6157
In various firmware versions of Lenovo System x, the integrated management module II (IMM2)'s first failure data capture (FFDC) includes the web server's private key in the generated log file for support.
CVE-2019-6156
In Lenovo systems, SMM BIOS Write Protection is used to prevent writes to SPI Flash. While this provides sufficient protection, an additional layer of protection is provided by SPI Protected Range Registers (PRx). Lenovo was notified that after resum...
CVE-2018-16098
In some Lenovo ThinkPads, an unquoted search path vulnerability was found in various versions of the Synaptics Pointing Device driver which could allow unauthorized code execution as a low privilege user.
CVE-2018-9085
A write protection lock bit was left unset after boot on an older generation of Lenovo and IBM System x servers, potentially allowing an attacker with administrator access to modify the subset of flash memory containing Intel Server Platform Services...
CVE-2018-9082
For some Iomega, Lenovo, LenovoEMC NAS devices versions 4.1.402.34662 and earlier, the password changing functionality available to authenticated users does not require the user's current password to set a new one. As a result, attackers with access ...
CVE-2018-9081
For some Iomega, Lenovo, LenovoEMC NAS devices versions 4.1.402.34662 and earlier, the file name used for assets accessible through the Content Viewer application are vulnerable to self cross-site scripting self-XSS. As a result, adversaries can add ...

Copyright 2019, cxsecurity.com

 

Back to Top