PT-2012-08: XPath Injection in WinCC (SCADA)
Vulnerable software
WinCC
Version: 7.0 SP3 before Update 2 and earlier
Application link:
http://www.siemens.com/
Severity level
Severity level: Medium
Impact: XPath Injection
Access Vector: Network exploitable
CVSS v2:
Base Score: 5.5
Vector: (AV:N/AC:L/Au:S/C:P/I:P/A:N)
CVE: CVE-2012-2596
Software description
Simatic WinCC is a part of Siemens SIMATIC HMI software that aimed to provide connection between an operator and PLCs that manage technological processes. SIMATIC HMI is responsible for technical process visualization, alarm system, process assessment and error logging, and also manages device parameters. The software is used in a number of industries including food, oil, gas, chemical, power industries.
Vulnerability description
The specialists of the Positive Research center have a vulnerability detected "XPath Injection" in WinCC.
The web application does not implement XPath input control. An attacker can read and modify environmental settings via malformed URL.
How to fix
Update your software up to the latest version
Advisory status
23.05.2012 - Vendor is notified
23.05.2012 - Vendor gets vulnerability details
05.06.2012 - Vendor releases fixed version and details
20.06.2012 - Public disclosure
Credits
The vulnerability was discovered by Sergey Scherbel, Yury Goltsev, Dmitry Serebryannikov, Sergey Bobrov, Denis Baranov, Andrey Medov, Artem Chaykin, Positive Research Center (Positive Technologies Company)
References
http://en.securitylab.ru/lab/PT-2012-08
http://www.siemens.com/corporate-technology/pool/de/forschungsfelder/siemens_security_advisory_ssa-223158.pdf
Reports on the vulnerabilities previously discovered by Positive Research:
http://ptsecurity.com/research/advisory/
http://en.securitylab.ru/lab/