{"vuid":"VU#893462","idnumber":"893462","name":"Thomson Reuters Velocity Analytics Vhayu Analytic Server version 6.9.4 build 2995 contains a code injection vulnerability","keywords":["Thomson Reuters","Vhayu","Velocity Analytics","code injection","CWE-94"],"overview":"Thomson Reuters Velocity Analytics Vhayu Analytic Server version 6.94 build 2995 and possibly earlier versions contain a code injection vulnerability (CWE-94).","clean_desc":"CWE-94: Improper Control of Generation of Code ('Code Injection') Thomson Reuters Velocity Analytics Vhayu Analytic Server version 6.94 build 2995 and possibly earlier versions contain a code injection vulnerability. By default, this software package is configured to run with system privileges. A remote unauthenticated attacker can craft a URL that utilizes the software's file import function to upload malicious files or execute arbitrary code. For example: http://www.example.com/VhttpdMgr?action=importFile&fileName={BACKDOOR}","impact":"A remote unauthenticated attacker may be able to upload malicious files or execute arbitrary code with system privileges.","resolution":"Update Thomson Reuters has released hotfix 6429: Security fix hot-fix for Velocity Analytics to address this vulnerability. Users affected by this vulnerability are advised to to download the fix from the from the Customer Zone.","workarounds":"Restrict access to the Analytic Server interface Restrict access to the Thomson Reuters Velocity Analytics Vhayu Analytic Server interface to trusted networks. If possible, configure management and transit networks for separate VLANs, or restrict access to the device using IP access lists.","sysaffected":"","thanks":"Thanks to \nEduardo Gonzalez Lainez\n for reporting this vulnerability.","author":"This document was written by Adam Rauf.","public":["http://cwe.mitre.org/data/definitions/94.html","http://thomsonreuters.com/enterprise-platform-velocity-analytics/","https://customers.reuters.com/a/support/technical/softwaredownload/download.aspx?productVersionReleaseId=20287"],"cveids":["CVE-2013-5912"],"certadvisory":"","uscerttechnicalalert":null,"datecreated":"2013-10-07T15:52:56Z","publicdate":"2013-11-21T00:00:00Z","datefirstpublished":"2013-11-22T14:24:53Z","dateupdated":"2017-10-18T17:27:51Z","revision":38,"vrda_d1_directreport":"1","vrda_d1_population":"2","vrda_d1_impact":"3","cam_widelyknown":"0","cam_exploitation":"0","cam_internetinfrastructure":"0","cam_population":"0","cam_impact":"0","cam_easeofexploitation":"0","cam_attackeraccessrequired":"0","cam_scorecurrent":"0","cam_scorecurrentwidelyknown":"0","cam_scorecurrentwidelyknownexploited":"0","ipprotocol":"","cvss_accessvector":"N","cvss_accesscomplexity":"L","cvss_authentication":null,"cvss_confidentialityimpact":"C","cvss_integrityimpact":"C","cvss_availabilityimpact":"C","cvss_exploitablity":null,"cvss_remediationlevel":"W","cvss_reportconfidence":"UC","cvss_collateraldamagepotential":"N","cvss_targetdistribution":"L","cvss_securityrequirementscr":"ND","cvss_securityrequirementsir":"ND","cvss_securityrequirementsar":"ND","cvss_basescore":"10","cvss_basevector":"AV:N/AC:L/Au:N/C:C/I:C/A:C","cvss_temporalscore":"7.3","cvss_environmentalscore":"1.81587475944","cvss_environmentalvector":"CDP:N/TD:L/CR:ND/IR:ND/AR:ND","metric":0.0,"vulnote":null}