PT-2013-38: Multiple SQL Injection vulnerabilities in Wonderware Information Server Vulnerable softwareWonderware Information Server Version 4.0 SP1, 4.5- Portal and 5.0- PortalApplication link: http://www.invensys.com/Severity levelSeverity level: High Impact: Arbitrary Code Execution Access Vector: Remote CVSS v2: Base Score: 9.3 Vector: (AV:N/AC:M/Au:N/C:C/I:C/A:C)CVE: CVE-2013-0684 Software descriptionWonderware Information Server aggregates and presents plant performance metrics and production data to operations, maintenance and engineering personnel, via an easy to implement web solution. Wonderware Information Server as well as Wonderware Intouch HMI are the part of a unified solution for building ArchestrA System Platform SCADA- and HMI-systems. This solution is used by personnel of nuclear power plants, chemical plants and other critically important objects.Vulnerability descriptionPositive Research Center experts have discovered multiple "SQL Injection" vulnerabilities in Wonderware Information Server. This vulnerability can be used by an attacker to perform database operations that were unintended by the Web application designer and, in some instances, can lead to total compromise of the database server. This vulnerability, if exploited, could allow arbitrary code execution.How to fixUpdate your software up to the latest version.Advisory status16.12.2012 - Vendor gets vulnerabilities details 23.04.2013 - Vendor releases fixed version and details 10.06.2013 - Public disclosureCreditsThese vulnerabilities have discovered by Ivan Poliyanchuk, Evgeny Ermakov, Nikita Mikhalevsky, Dmitry Serebryannikov, Vyacheslav Egoshin, Gleb Gritsai, Denis Baranov, Positive Research Center (Positive Technologies Company)Referenceshttp://en.securitylab.ru/lab/PT-2013-38 https://wdn.wonderware.com/sites/WDN/Pages/Downloads/Software.aspx https://ics-cert.us-cert.gov/advisories/ICSA-13-113-01 Reports on the vulnerabilities previously discovered by Positive Research:http://ptsecurity.com/research/advisory/ http://en.securitylab.ru/lab/