PT-2013-37: Multiple Cross Site Scripting (XSS) in Wonderware Information Server
Vulnerable software
Wonderware Information Server
Version 4.0 SP1, 4.5- Portal and 5.0- Portal
Application link:
http://www.invensys.com/
Severity level
Severity level: High
Impact: Cross Site Scripting
Access Vector: Remote
CVSS v2:
Base Score: 9.3
Vector: (AV:N/AC:M/Au:N/C:C/I:C/A:C)
CVE: CVE-2013-0688
Software description
Wonderware Information Server aggregates and presents plant performance metrics and production data to operations, maintenance and engineering personnel, via an easy to implement web solution. Wonderware Information Server as well as Wonderware Intouch HMI are the part of a unified solution for building ArchestrA System Platform SCADA- and HMI-systems. This solution is used by personnel of nuclear power plants, chemical plants and other critically important objects.
Vulnerability description
Positive Research Center experts have discovered multiple "Cross Site Scripting" vulnerabilities in Wonderware Information Server.
This vulnerability enables an attacker to inject client-side script into Web pages viewed by other users or bypass client-side security mechanisms imposed by modern Web browsers. This vulnerability, if exploited, could allow arbitrary code execution and may require social engineering to exploit.
How to fix
Update your software up to the latest version.
Advisory status
16.12.2012 - Vendor gets vulnerabilities details
23.04.2013 - Vendor releases fixed version and details
10.06.2013 - Public disclosure
Credits
These vulnerabilities have discovered by Ivan Poliyanchuk, Evgeny Ermakov, Nikita Mikhalevsky, Dmitry Serebryannikov, Vyacheslav Egoshin, Gleb Gritsai, Denis Baranov, Positive Research Center (Positive Technologies Company)
References
http://en.securitylab.ru/lab/PT-2013-37
https://wdn.wonderware.com/sites/WDN/Pages/Downloads/Software.aspx
https://ics-cert.us-cert.gov/advisories/ICSA-13-113-01
Reports on the vulnerabilities previously discovered by Positive Research:
http://ptsecurity.com/research/advisory/
http://en.securitylab.ru/lab/