CVE-2012-1843

Summary

CVECVE-2012-1843
StatePUBLIC
Assigner[email protected]
Source PriorityCVE Program / NVD first with legacy fallback
Published2012-03-22 10:17:00 UTC
Updated2018-01-10 02:29:00 UTC
DescriptionCross-site request forgery (CSRF) vulnerability in saveRestore.htm on the Quantum Scalar i500 tape library with firmware before i7.0.3 (604G.GS00100), also distributed as the Dell ML6000 tape library with firmware before A20-00 (590G.GS00100), allows remote attackers to hijack the authentication of users for requests that execute Linux commands via the fileName parameter, related to a "command-injection vulnerability."

Risk And Classification

Problem Types: CWE-352

NVD Known Affected Configurations (CPE 2.3)

TypeVendorProductVersionUpdateEditionLanguage
Hardware Dell Powervault Ml6000 32u All All All
Hardware Dell Powervault Ml6000 41u All All All
Hardware Dell Powervault Ml6000 32u All All All
Hardware Dell Powervault Ml6000 41u All All All
Application Dell Powervault Ml6000 Firmware 585g.gs003 All All All
Application Dell Powervault Ml6000 Firmware 585g.gs003 All All All
Hardware Dell Powervault Ml6010 5u All All All
Hardware Dell Powervault Ml6010 5u All All All
Hardware Dell Powervault Ml6020 14u All All All
Hardware Dell Powervault Ml6020 14u All All All
Hardware Dell Powervault Ml6030 23u All All All
Hardware Dell Powervault Ml6030 23u All All All
Hardware Quantum Scalar I500 14u All All All
Hardware Quantum Scalar I500 23u All All All
Hardware Quantum Scalar I500 5u All All All
Hardware Quantum Scalar I500 14u All All All
Hardware Quantum Scalar I500 23u All All All
Hardware Quantum Scalar I500 5u All All All
Application Quantum Scalar I500 Firmware i2 All All All
Application Quantum Scalar I500 Firmware i3 All All All
Application Quantum Scalar I500 Firmware i3.1 All All All
Application Quantum Scalar I500 Firmware i4 All All All
Application Quantum Scalar I500 Firmware i5 All All All
Application Quantum Scalar I500 Firmware i5.1 All All All
Application Quantum Scalar I500 Firmware i6 All All All
Application Quantum Scalar I500 Firmware i6.1 All All All
Application Quantum Scalar I500 Firmware i7 All All All
Application Quantum Scalar I500 Firmware i7.0.1 All All All
Application Quantum Scalar I500 Firmware sp4 All All All
Application Quantum Scalar I500 Firmware sp4.2 All All All
Application Quantum Scalar I500 Firmware i2 All All All
Application Quantum Scalar I500 Firmware i3 All All All
Application Quantum Scalar I500 Firmware i3.1 All All All
Application Quantum Scalar I500 Firmware i4 All All All
Application Quantum Scalar I500 Firmware i5 All All All
Application Quantum Scalar I500 Firmware i5.1 All All All
Application Quantum Scalar I500 Firmware i6 All All All
Application Quantum Scalar I500 Firmware i6.1 All All All
Application Quantum Scalar I500 Firmware i7 All All All
Application Quantum Scalar I500 Firmware i7.0.1 All All All
Application Quantum Scalar I500 Firmware sp4 All All All
Application Quantum Scalar I500 Firmware sp4.2 All All All
Application Quantum Scalar I500 Firmware All All All All

References

ReferenceSourceLinkTags
Dell Computer Corporation, Inc. Information for VU#913483 MISC www.kb.cert.org US Government Resource
IBM X-Force Exchange XF exchange.xforce.ibmcloud.com
US-CERT Vulnerability Note VU#913483 - Quantum Scalar i500, Dell ML6000 and IBM TS3310 tape libraries web interface and preconfigured password vulnerabilities CERT-VN www.kb.cert.org US Government Resource
About Secunia Research | Flexera SECUNIA secunia.com
80227 OSVDB osvdb.org
Security Advisory SA48453 - Dell PowerVault ML6000 Multiple Vulnerabilities - Secunia SECUNIA secunia.com
Quantum Information for VU#913483 MISC www.kb.cert.org US Government Resource
CVE Program record CVE.ORG www.cve.org canonical
NVD vulnerability detail NVD nvd.nist.gov canonical, analysis

Vendor Comments And Credit

OrganizationPublishedContributorStatement
Quantum Corporation2012-06-13An authentication is required to exploit this issue. The vulnerability has never been exploited. However to make sure our customers are protected, all newly shipped versions of the product contain the update that fixes this issue. An official firmware release that fixes the vulnerability is also available for all existing customers. The customer data stored on tape cannot be exploited by this vulnerability.
© CVE.report 2026 |

Use of this information constitutes acceptance for use in an AS IS condition. There are NO warranties, implied or otherwise, with regard to this information or its use. Any use of this information is at the user's risk. It is the responsibility of user to evaluate the accuracy, completeness or usefulness of any information, opinion, advice or other content. EACH USER WILL BE SOLELY RESPONSIBLE FOR ANY consequences of his or her direct or indirect use of this web site. ALL WARRANTIES OF ANY KIND ARE EXPRESSLY DISCLAIMED. This site will NOT BE LIABLE FOR ANY DIRECT, INDIRECT or any other kind of loss.

CVE, CWE, and OVAL are registred trademarks of The MITRE Corporation and the authoritative source of CVE content is MITRE's CVE web site. This site includes MITRE data granted under the following license.

CVE.report and Source URL Uptime Status status.cve.report