
====================================================================

                             CERT-Renater

                 Note d'Information No. 2020/VULN181
_____________________________________________________________________

DATE                : 08/04/2020

HARDWARE PLATFORM(S): Vertiv Avocent Universal Management Gateway Model
                                     UMG-4000.

OPERATING SYSTEM(S): Universal Management Gateway firmware versions
                                    prior to 4.2.2.21.

=====================================================================
https://kb.cert.org/vuls/id/944837/
_____________________________________________________________________


Vertiv Avocent UMG-4000 vulnerable to command injection and cross-site
scripting vulnerabilities

Vulnerability Note VU#944837
Original Release Date: 2020-03-30 | Last Revised: 2020-03-30


Overview

The Vertiv Avocent Universal Management Gateway Model UMG-4000 is a data
center management appliance. The web interface of the UMG-4000 is
vulnerable to command injection, stored cross-site scripting (XSS), and
reflected XSS, which may allow an authenticated attacker with
administrative privileges to remotely execute arbitrary code.


Description

The Vertiv Avocent UMG-4000 contains multiple vulnerabilities that could
allow an authenticated attacker with administrative privileges to
remotely execute arbitrary code. The web interface does not sanitize
input provided from the remote client, making it vulnerable to command
injection, stored cross-site scripting, and reflected cross-site
scripting.


CVE-2019-9507 - CWE-95
The web interface of the Avocent UMG-4000 version 4.2.1.19 is vulnerable
to command injection because the application incorrectly neutralizes
code syntax before executing. Since all commands within the web
application are executed as root, this could allow a remote attacker
authenticated with an administrator account to execute arbitrary
commands. The CVSS 2.0 score below is based on CVE-2019-9507.


CVE-2019-9508 - CWE-79
The web interface of the Avocent UMG-4000 version 4.2.1.19 is vulnerable
to stored XSS. A remote attacker authenticated with an administrator
account could store a maliciously named file within the web application
that would execute each time a user browsed to the page.


CVE-2019-9509 - CWE-79
The web interface of the Avocent UMG-4000 version 4.2.1.19 is vulnerable
to reflected XSS in an HTTP POST parameter. The web application does not
neutralize user-controllable input before displaying to users in a web
page, which could allow a remote attacker authenticated with a user
account to execute arbitrary code.



Impact

An authenticated remote attacker could inject arbitrary scripts or
persistently store malicious scripts on the web server that could be
used to collect and exfiltrate sensitive information.



Solution

Apply an update

Vertiv Avocent has addressed these issues in the below versions:

Non-Trellis customers are encouraged to install Universal Management
Gateway firmware version 4.2.2.21 or higher to address these
vulnerabilities, located here.

Trellis users of the Universal Management Gateway running firmware
version 4.2.0.23 that are operating Trellis versions 5.0.2 through 5.0.6
should install the update patch located here.

Trellis users of the Universal Management Gateway that are operating
Trellis versions 5.0.6 and later should install Universal Gateway
firmware version 4.3.0.23 located here.


Vendor Information


Notified:  February 28, 2019 Updated:  March 23, 2020

Statement Date:   January 07, 2020

Status

  Affected


Vendor Statement

Vertiv (Avocent) has addressed these issues.

    Non-Trellis customers are encouraged to install Universal Management
Gateway firmware version 4.2.2.21 or higher to address these
vulnerabilities, located here.

    Trellis users of the Universal Management Gateway running firmware
version 4.2.0.34 that are operating Trellis versions 5.0.2 through 5.0.6
should install the update patch located here.

    Trellis users of the Universal Management Gateway that are operating
Trellis versions 5.0.6 and later should install Universal Gateway
firmware version 4.3.0.23 located here.


Vendor Information

We are not aware of further vendor information regarding this
vulnerability.


Vendor References


https://www.vertiv.com/en-us/support/software-download/software/trellis-enterprise-and-quick-start-solutions-software-downloads/

https://www.vertiv.com/en-us/support/software-download/it-management/avocent-universal-management-gateway-appliance--software-downloads/

https://www.vertiv.com/globalassets/documents/firmware/universal-management-gateway-release-notes-v4.3.0.23_vertiv_update.pdf


CVSS Metrics

Group           Score   Vector
Base            8.5     AV:N/AC:M/Au:S/C:C/I:C/A:C
Temporal        6.7     E:POC/RL:OF/RC:C
Environmental   6.7     CDP:ND/TD:ND/CR:ND/IR:ND/AR:ND


References


https://www.vertiv.com/globalassets/documents/firmware/universal-management-gateway-release-notes-v4.3.0.23_vertiv_update.pdf
https://www.vertiv.com/en-us/support/software-download/it-management/avocent-universal-management-gateway-appliance--software-downloads/

https://www.vertiv.com/en-us/support/software-download/software/trellis-enterprise-and-quick-start-solutions-software-downloads/
    https://cwe.mitre.org/data/definitions/95.html
    https://cwe.mitre.org/data/definitions/79.html

https://www.owasp.org/index.php/Cross-site_Scripting_(XSS)#Stored_and_Reflected_XSS_Attacks

https://cheatsheetseries.owasp.org/cheatsheets/OS_Command_Injection_Defense_Cheat_Sheet.html


Acknowledgements

This document was written by Laurie Tyzenhaus.


Other Information

CVE IDs:                CVE-2019-9507, CVE-2019-9508, CVE-2019-9509
Date Public:            2019-04-12
Date First Published:   2020-03-30
Date Last Updated:      2020-03-30 17:38 UTC
Document Revision:      93

=========================================================
+ CERT-RENATER        | tel : 01-53-94-20-44            +
+ 23/25 Rue Daviel    | fax : 01-53-94-20-41            +
+ 75013 Paris         | email:cert@support.renater.fr   +
=========================================================



