PT-2013-36: XML External Entity Injection in Wonderware Win-XML Exporter
Vulnerable software
Wonderware Win-XML Exporter
Version: 1522.148.0.0 and earlier
Application link:
http://global.wonderware.com/EN/Pages/default.aspx
Severity level
Severity level: Medium
Impact: Internal Network Resources and File System Access, Denial of Service
Access Vector: Remote
CVSS v2:
Base Score: 6.3
Vector: (AV:L/AC:M/Au:N/C:C/I:N/A:C)
CVE: CVE-2012-4710
Software description
Wonderware Win-XML Exporter converts interface windows from Intouch HMI projects and displays them in Internet Explorer with the help of Wonderware Information Server.
Vulnerability description
Positive Research Center experts have discovered "XML External Entity Injection" vulnerability in Wonderware Win-XML Exporter.
If an attacker manages to make a victim open a project that contains specially crafted XML, Wonderware Win-XML Exporter will automatically send the contents of local or remote resource to the attacker's server. It also makes possible to conduct denial of service attacks.
How to fix
Update your software up to the latest version.
Advisory status
22.11.2012 - Vendor gets vulnerability details
21.03.2013 - Vendor releases fixed version and details
03.04.2013 - Public disclosure
Credits
The vulnerability was discovered by Timur Yunusov, Alexey Osipov, Ilya Karpov, Positive Research Center (Positive Technologies Company)
References
http://en.securitylab.ru/lab/PT-2013-36
Reports on the vulnerabilities previously discovered by Positive Research:
http://ptsecurity.com/research/advisory/
http://en.securitylab.ru/lab/