PT-2012-42: Multiple Cross Site Scripting and Cross Site Request Forgery vulnerabilities in Siemens Simatic WinCC WebNavigator
Vulnerable software
Siemens Simatic WinCC WebNavigator
Version: 7.0 SP3 and earlier
Application link:
http://www.siemens.com/
Vulnerabilities description
The specialists of the Positive Research center have revealed a multiple Cross Site Scripting and Cross Site Request Forgery vulnerabilities in Siemens Simatic WinCC WebNavigator.
CVSS v2:
Base Score: 8.3
Vector: (AV:N/AC:M/Au:N/C:P/I:P/A:C)
CVE: CVE-2012-3031
Reflected Cross Site Scripting was found in POST parameters, GET parameters and referrers. If this attack is successful, the attacker can take over the WebNavigator session with the victim’s rights.
CVSS v2:
Base Score: 7.8
Vector: (AV:N/AC:M/Au:N/C:N/I:P/A:C)
CVE: CVE-2012-3028
Cross Site Request Forgery is related to the Cross Site Scripting vulnerability and works in a similar way: If a victim clicks on a malicious link, actions can be triggered in the browser, where WebNavigator is running.
How to fix
Update your software up to the latest version
Advisory status
16.07.2012 - Vendor is notified
16.07.2012 - Vendor gets vulnerability details
10.09.2012 - Vendor releases fixed version and details
13.09.2012 - Public disclosure
Credits
The vulnerabilities was discovered by Sergey Bobrov, Timur Yunusov, Artem Chaykin, Pavel Toporkov, Vladimir Kochetkov, Positive Research Center (Positive Technologies Company)
References
http://en.securitylab.ru/lab/PT-2012-42
http://www.siemens.com/corporate-technology/pool/de/forschungsfelder/siemens_security_advisory_ssa-864051.pdf
Reports on the vulnerabilities previously discovered by Positive Research:
http://ptsecurity.com/research/advisory/
http://en.securitylab.ru/lab/