{"vuid":"VU#229047","idnumber":"229047","name":"Allround Automations PL/SQL Developer v11 performs updates over HTTP","keywords":["http","updates","CWE-345"],"overview":"Allround Automations PL/SQL Developer version 11 checks for updates over HTTP and does not verify updates before executing commands, which may allow an attacker to execute arbitrary code.","clean_desc":"CWE-345: Insufficient Verification of Data Authenticity - CVE-2016-2346 According to the researcher, Allround Automations PL/SQL Developer version 11 periodically checks for updates over HTTP. When an update is available, PL/SQL Developer downloads the update and executes the update without verifying authenticity or performing other checks. By intercepting such requests and modifying the necessary fields, an attacker with a man-in-the-middle position between the victim and the network may be able write arbitrary data to vulnerable devices and execute arbitrary code with permissions of the PL/SQL Developer user. The researcher has published a blog post with more information.","impact":"A remote attacker with a man-in-the-middle position may able to execute code with permissions of the PL/SQL Developer user.","resolution":"Apply an update PL/SQL Developer version 11.0.6 has been released to address this issue. The update utility now uses HTTPS and restricts downloads to the allroundautomations.com domain. Affected users may also consider the following workaround:","workarounds":"Avoid untrusted networks Avoid using untrusted networks, including public WiFi. Using your device on an untrusted network increases the chance of falling victim to a man-in-the-middle attack that could intercept your HTTP data.","sysaffected":"","thanks":"Thanks to Adam Caudill for reporting this vulnerability.","author":"This document was written by Garret Wassermann.","public":["h","t","t","p","s",":","/","/","a","d","a","m","c","a","u","d","i","l","l",".","c","o","m","/","2","0","1","6","/","0","5","/","0","1","/","p","l","s","q","l","-","d","e","v","e","l","o","p","e","r","-","h","t","t","p","-","t","o","-","c","o","m","m","a","n","d","-","e","x","e","c","u","t","i","o","n","/"],"cveids":["CVE-2016-2346"],"certadvisory":"","uscerttechnicalalert":null,"datecreated":"2016-02-15T14:56:05Z","publicdate":"2016-04-29T00:00:00Z","datefirstpublished":"2016-04-25T14:55:31Z","dateupdated":"2016-05-02T15:23:27Z","revision":49,"vrda_d1_directreport":"1","vrda_d1_population":"2","vrda_d1_impact":"2","cam_widelyknown":"0","cam_exploitation":"0","cam_internetinfrastructure":"0","cam_population":"0","cam_impact":"0","cam_easeofexploitation":"0","cam_attackeraccessrequired":"0","cam_scorecurrent":"0","cam_scorecurrentwidelyknown":"0","cam_scorecurrentwidelyknownexploited":"0","ipprotocol":"","cvss_accessvector":"N","cvss_accesscomplexity":"L","cvss_authentication":null,"cvss_confidentialityimpact":"P","cvss_integrityimpact":"P","cvss_availabilityimpact":"P","cvss_exploitablity":null,"cvss_remediationlevel":"U","cvss_reportconfidence":"UR","cvss_collateraldamagepotential":"ND","cvss_targetdistribution":"M","cvss_securityrequirementscr":"ND","cvss_securityrequirementsir":"ND","cvss_securityrequirementsar":"ND","cvss_basescore":"7.5","cvss_basevector":"AV:N/AC:L/Au:N/C:P/I:P/A:P","cvss_temporalscore":"6.4","cvss_environmentalscore":"4.79953764322594","cvss_environmentalvector":"CDP:ND/TD:M/CR:ND/IR:ND/AR:ND","metric":0.0,"vulnote":null}