PT-2013-32: Directory Traversal in Siemens Simatic WinCC TIA Portal
Vulnerable software
Siemens Simatic WinCC TIA Portal
Version: 11.x
Application link:
http://www.siemens.com/
Severity level
Severity level: Medium
Impact: Directory Traversal
Access Vector: Remote
CVSS v2:
Base Score: 4.0
Vector: (AV:N/AC:L/Au:S/C:N/I:N/A:P)
CVE: CVE-2013-0671
Software description
WinCC TIA Portal is part of a new, integrated engineering concept which offers a uniform engineering environment for programming and configuration of control, visualization and drive solutions.
Vulnerability description
The specialists of the Positive Research center have detected "Directory Traversal" vulnerability in Siemens Simatic WinCC TIA Portal.
By manipulating the URL an authenticated attacker may have access to source code of the panel’s server-side web application files, which may include user defined scripts.
How to fix
Update your software up to the latest version
Advisory status
21.09.2012 - Vendor gets vulnerability details
15.03.2013 - Vendor releases fixed version and details
29.03.2013 - Public disclosure
Credits
The vulnerability was discovered by Sergey Bobrov, Roman Ilin, Ilya Karpov, Positive Research Center (Positive Technologies Company)
References
http://en.securitylab.ru/lab/PT-2013-32
http://www.siemens.com/corporate-technology/pool/de/forschungsfelder/siemens_security_advisory_ssa-212483.pdf
Reports on the vulnerabilities previously discovered by Positive Research:
http://ptsecurity.com/research/advisory/
http://en.securitylab.ru/lab/