PT-2014-56: Server Side Request Forgery in Honeywell EPKS
Severity level: High
Impact: Server Side Request Forgery
Access Vector: Remote
Base Score: 8.0
CVE: not assigned
Honeywell Experion PKS is a cost-effective open control and safety system that expands the role of distributed control. Experion provides a safe, robust, scalable, plant-wide system with unprecedented connectivity through all levels of the plant.
The specialists of the Positive Research center have detected a Server Side Request Forgery vulnerability in Honeywell EPKS.
Control Builder software has the ability to manage PLC projects, importing and exporting project files. Project description is stored in XML files which are allowed to contain external DOCTYPE that could allow to craft request to inernal network.
How to fix
Update your sofware up to the latest version
06.03.2014 - Vendor gets vulnerability details
02.06.2014 - Vendor releases fixed version and details
18.11.2014 - Public disclosure
The vulnerability was detected by Artem Chaykin, Positive Research Center (Positive Technologies Company)
Reports on the vulnerabilities previously discovered by Positive Research: