PT-2012-44: SQL Injection in SOAP Web interfaces in Siemens Simatic WinCC WebNavigator Vulnerable softwareSiemens Simatic WinCC WebNavigator Version: 7.0 SP3 and earlierApplication link: http://www.siemens.com/Severity levelSeverity level: High Impact: SQL Injection Access Vector: Remote CVSS v2: Base Score: 9.0 Vector: (AV:N/AC:L/Au:N/C:P/I:P/A:C)CVE: CVE-2012-3032Software description Simatic WinCC is a part of Siemens SIMATIC HMI software that aimed to provide connection between an operator and PLCs that manage technological processes. The WebNavigator component of WinCC gives the users the possibility to control their plants via the web browser with the same look-and-feel like local operator stations.Vulnerability descriptionThe specialists of the Positive Research center have detected "SQL Injection" vulnerability in Siemens Simatic WinCC WebNavigator.WebNavigator uses part of the content of SOAP messages to create SQL database queries. If an attacker sends a specially crafted SOAP message to the server, the resulting SQL queries might read or write more data in the database than originally intended. How to fixUpdate your software up to the latest versionAdvisory status16.07.2012 - Vendor is notified 16.07.2012 - Vendor gets vulnerability details 10.09.2012 - Vendor releases fixed version and details 13.09.2012 - Public disclosureCreditsThe vulnerability was discovered by Denis Baranov, Vladimir Kochetkov, Positive Research Center (Positive Technologies Company)Referenceshttp://en.securitylab.ru/lab/PT-2012-44 http://www.siemens.com/corporate-technology/pool/de/forschungsfelder/siemens_security_advisory_ssa-864051.pdf Reports on the vulnerabilities previously discovered by Positive Research:http://ptsecurity.com/research/advisory/ http://en.securitylab.ru/lab/