Vulnerability Name:

CVE-2015-7675 (CCN-110251)

Assigned:2015-10-02
Published:2016-01-27
Updated:2016-02-18
Summary:The "Send as attachment" feature in Ipswitch MOVEit DMZ before 8.2 and MOVEit Mobile before 1.2.2 allow remote authenticated users to bypass authorization and read uploaded files via a valid FileID in the (1) serverFileIds parameter to mobile/sendMsg or (2) arg01 parameter to human.aspx.
CVSS v3 Severity:6.5 Medium (CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N)
5.7 Medium (Temporal CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:U/RC:R)
Exploitability Metrics:Attack Vector (AV): Network
Attack Complexity (AC): Low
Privileges Required (PR): Low
User Interaction (UI): None
Scope:Scope (S): Unchanged
Impact Metrics:Confidentiality (C): High
Integrity (I): None
Availibility (A): None
4.3 Medium (CCN CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N)
3.8 Low (CCN Temporal CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N/E:U/RL:U/RC:R)
Exploitability Metrics:Attack Vector (AV): Network
Attack Complexity (AC): Low
Privileges Required (PR): Low
User Interaction (UI): None
Scope:Scope (S): Unchanged
Impact Metrics:Confidentiality (C): Low
Integrity (I): None
Availibility (A): None
CVSS v2 Severity:4.0 Medium (CVSS v2 Vector: AV:N/AC:L/Au:S/C:P/I:N/A:N)
Exploitability Metrics:Access Vector (AV): Network
Access Complexity (AC): Low
Authentication (Au): Single_Instance
Impact Metrics:Confidentiality (C): Partial
Integrity (I): None
Availibility (A): None
4.0 Medium (CCN CVSS v2 Vector: AV:N/AC:L/Au:S/C:P/I:N/A:N)
Exploitability Metrics:Access Vector (AV): Network
Access Complexity (AC): Low
Athentication (Au): Single_Instance
Impact Metrics:Confidentiality (C): Partial
Integrity (I): None
Availibility (A): None
Vulnerability Type:CWE-200
Vulnerability Consequences:Obtain Information
References:Source: MITRE
Type: CNA
CVE-2015-7675

Source: CONFIRM
Type: Vendor Advisory
http://docs.ipswitch.com/MOVEit/DMZ82/ReleaseNotes/MOVEitReleaseNotes82.pdf

Source: MISC
Type: Exploit
http://packetstormsecurity.com/files/135457/Ipswitch-MOVEit-DMZ-8.1-Authorization-Bypass.html

Source: CCN
Type: Full-Disclosure Mailing List, Wed, 27 Jan 2016 14:43:24 +0100
Multiple security issues in MOVEit Managed File Transfer application

Source: FULLDISC
Type: UNKNOWN
20160127 Multiple security issues in MOVEit Managed File Transfer application

Source: CCN
Type: Ipswitch Web site
Secure Managed File Transfer (MFT) Solutions | Ipswitch File Transfer

Source: XF
Type: UNKNOWN
moveit-cve20157675-info-disc(110251)

Source: CCN
Type: Packet Storm Security [01-28-2016]
Ipswitch MOVEit DMZ 8.1 Authorization Bypass

Source: MISC
Type: Exploit
https://www.profundis-labs.com/advisories/CVE-2015-7675.txt

Vulnerable Configuration:Configuration 1:
  • cpe:/a:ipswitch:moveit_dmz:*:*:*:*:*:*:*:* (Version <= 8.1)
  • OR cpe:/a:ipswitch:moveit_mobile:*:*:*:*:*:*:*:* (Version <= 1.2.0.962)

  • Configuration CCN 1:
  • cpe:/a:ipswitch:moveit_dmz:8.1:*:*:*:*:*:*:*
  • OR cpe:/a:ipswitch:moveit_mobile:1.2.0.962:*:*:*:*:*:*:*

  • * Denotes that component is vulnerable
    BACK
    ipswitch moveit dmz *
    ipswitch moveit mobile *
    ipswitch moveit dmz 8.1
    ipswitch moveit mobile 1.2.0.962