Full Disclosure mailing list archives

ESA-2017-099: EMC AppSync SQL Injection Vulnerability


From: EMC Product Security Response Center <Security_Alert () emc com>
Date: Wed, 6 Sep 2017 14:10:11 +0000

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

ESA-2017-099: EMC AppSync SQL Injection Vulnerability

EMC Identifier: ESA-2017-099
CVE Identifier: CVE-2017-8015
Severity Rating: CVSS v3 Base Score: 8.5 (AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:L)

Affected products:  
EMC AppSync all versions prior to 3.5

Summary:  
EMC AppSync contains a SQL injection vulnerability that could potentially be exploited by malicious users to compromise 
the affected system. 
Details:  

EMC AppSync is affected by a SQL injection vulnerability.  Attackers could potentially exploit this vulnerability to 
access information, modify data or disrupt certain services by causing execution of arbitrary SQL commands on the 
application using default Apollo framework user accounts "apollo" and "test". 

Resolution:  
The following EMC AppSync release contains resolution to this vulnerability: 
*       EMC AppSync version 3.5 and later (security patch "AppSync Security Update for SQL Injection Vulnerability" is 
required on top of version 3.5)

As part of mitigation, default Apollo framework user accounts "apollo" and "test" have been also removed as they are 
not used by AppSync application. 

EMC recommends all customers upgrade at the earliest opportunity. 

Link to remedies:

Customers can download AppSync 3.5 software from https://support.emc.com/downloads/25364_AppSync
Customers can download the security patch "AppSync Security Update for SQL Injection Vulnerability" from 
https://download.emc.com/downloads/DL86269 


Credit:
EMC would like to thank rgod working with Trend Micro's Zero Day Initiative for reporting this vulnerability.
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v2

iQEcBAEBCAAGBQJZr//7AAoJEHbcu+fsE81ZIx8IAINfysHyM6BKb8SHjOJHKj/5
xgQ4DMSTE3CCK91Uo4J47G19C3eas5nfMjiHz4/0+laqSqLePOkckK63zMteH7WE
2WNOJXQwRoJtDV0xPt6WlJgkCgvk4o5u+KdYJUG98YJWZBAlU1zuTQ3HgJf3UgKW
2WTvprKLY+jl6QuMu3K5Sr4OlU+Vy0X+uspqaOZ1L+ITf9oHWrPvQnMqjXoniOcO
wtjKOCCxUciXVIowPcX7S8DH9ikZO0mCj2s88HjGu5gI6fEx1VOCne8tssbbKvoB
pvGFtNSbeJ/EcoAyA9SORH9urzS9kxd6891+QiJzgIkqfP1LBJ36XywtRA73sN0=
=E38G
-----END PGP SIGNATURE-----

_______________________________________________
Sent through the Full Disclosure mailing list
https://nmap.org/mailman/listinfo/fulldisclosure
Web Archives & RSS: http://seclists.org/fulldisclosure/


Current thread: