PT-2012-42: Multiple Cross Site Scripting and Cross Site Request Forgery vulnerabilities in Siemens Simatic WinCC WebNavigator

Vulnerable software

Siemens Simatic WinCC WebNavigator
Version: 7.0 SP3 and earlier

Application link:
http://www.siemens.com/

Vulnerabilities description

The specialists of the Positive Research center have revealed a multiple Cross Site Scripting and Cross Site Request Forgery vulnerabilities in Siemens Simatic WinCC WebNavigator.

CVSS v2:
Base Score: 8.3
Vector: (AV:N/AC:M/Au:N/C:P/I:P/A:C)

CVE: CVE-2012-3031

Reflected Cross Site Scripting was found in POST parameters, GET parameters and referrers. If this attack is successful, the attacker can take over the WebNavigator session with the victim’s rights.

CVSS v2:
Base Score: 7.8
Vector: (AV:N/AC:M/Au:N/C:N/I:P/A:C)

CVE: CVE-2012-3028

Cross Site Request Forgery is related to the Cross Site Scripting vulnerability and works in a similar way: If a victim clicks on a malicious link, actions can be triggered in the browser, where WebNavigator is running.

How to fix

Update your software up to the latest version

Advisory status

16.07.2012 - Vendor is notified
16.07.2012 - Vendor gets vulnerability details
10.09.2012 - Vendor releases fixed version and details
13.09.2012 - Public disclosure

Credits

The vulnerabilities was discovered by Sergey Bobrov, Timur Yunusov, Artem Chaykin, Pavel Toporkov, Vladimir Kochetkov, Positive Research Center (Positive Technologies Company)

References

http://en.securitylab.ru/lab/PT-2012-42
http://www.siemens.com/corporate-technology/pool/de/forschungsfelder/siemens_security_advisory_ssa-864051.pdf

Reports on the vulnerabilities previously discovered by Positive Research:

http://ptsecurity.com/research/advisory/
http://en.securitylab.ru/lab/

Threatscape
Visionary WAF – Constant innovation