Vulnerability   
Search   
    Search 324607 CVE descriptions
and 145615 test descriptions,
access 10,000+ cross references.
Tests   CVE   All  

Test ID:1.3.6.1.4.1.25623.1.0.105241
Category:Web application abuses
Title:EMC M&R (Watch4net) < 6.5u1 Multiple Vulnerabilities
Summary:EMC M&R (Watch4net) is prone to multiple vulnerabilities.
Description:Summary:
EMC M&R (Watch4net) is prone to multiple vulnerabilities.

Vulnerability Insight:
The following flaws exist:

- Credential Disclosure: It was discovered that EMC M&R (Watch4net) credentials of remote servers
stored in Watch4net are encrypted using a fixed hardcoded password. If an attacker manages to
obtain a copy of the encrypted credentials, it is trivial to decrypt them.

- Directory Traversal: A path traversal vulnerability was found in EMC M&R (Watch4net) Device
Discovery. This vulnerability allows an attacker to access sensitive files containing
configuration data, passwords, database records, log data, source code, and program scripts and
binaries.

- Arbitrary File Upload Vulnerability: An attacker may leverage this issue to upload arbitrary
files to the affected computer. This can result in arbitrary code execution within the context of
the vulnerable application.

- Multiple Cross Site Scripting Vulnerabilities: Multiple cross site scripting vulnerabilities
were found in EMC M&R (Watch4net) Centralized Management Console, Web Portal and Alerting
Frontend.

Vulnerability Impact:
A remote attacker could exploit the traversal vulnerability using
directory traversal characters ('../') to access arbitrary files that contain sensitive
information. Information harvested may aid in launching further attacks.

An attacker may leverage the Arbitrary File Upload Vulnerability to upload arbitrary files to the
affected computer. This can result in arbitrary code execution within the context of the
vulnerable application.

An attacker may leverage the Cross Site Scripting Vulnerabilities to execute arbitrary script code
in the browser of an unsuspecting user in the context of the affected site. This can allow the
attacker to steal cookie-based authentication credentials and launch other attacks.

Affected Software/OS:
EMC M&R (Watch4net) before 6.5u1.

Solution:
Updates are available.

CVSS Score:
6.5

CVSS Vector:
AV:N/AC:L/Au:S/C:P/I:P/A:P

Cross-Ref: Common Vulnerability Exposure (CVE) ID: CVE-2015-0513
BugTraq ID: 72259
http://www.securityfocus.com/bid/72259
Bugtraq: 20150120 ESA-2015-004: EMC M&R (Watch4Net) Multiple Vulnerabilities (Google Search)
http://archives.neohapsis.com/archives/bugtraq/2015-01/0092.html
http://www.securitytracker.com/id/1031567
Common Vulnerability Exposure (CVE) ID: CVE-2015-0515
BugTraq ID: 72256
http://www.securityfocus.com/bid/72256
Common Vulnerability Exposure (CVE) ID: CVE-2015-0516
BugTraq ID: 72255
http://www.securityfocus.com/bid/72255
Bugtraq: 20150318 Path traversal vulnerability in EMC M&R (Watch4net) MIB Browser (Google Search)
http://www.securityfocus.com/archive/1/534929/100/0/threaded
http://seclists.org/fulldisclosure/2015/Mar/116
https://www.securify.nl/advisory/SFY20141105/path_traversal_vulnerability_in_emc_m_r__watch4net__mib_browser.html
CopyrightCopyright (C) 2015 Greenbone AG

This is only one of 145615 vulnerability tests in our test suite. Find out more about running a complete security audit.

To run a free test of this vulnerability against your system, register below.




© 1998-2025 E-Soft Inc. All rights reserved.