PT-2015-04: JNLP File Inclusion in Inductive Automation Ignition
Vulnerable software
Inductive Automation Ignition
Version: 7.7.3 and earlier
Link:
https://www.inductiveautomation.com/
Severity level
Severity level: High
Impact: JNLP File Inclusion
Access Vector: Remote
CVSS v2:
Base Score: 7.3
Vector: (AV:N/AC:H/Au:N/C:C/I:C/A:P)
CVE: not assigned
Software description
Inductive Automation Ignition is a cross-platform HMI, SCADA, and MES solution.
Vulnerability description
The specialists of the Positive Research center have detected a JNLP File Inclusion vulnerability in Inductive Automation Ignition.
Adding any symbols to users’ web request for starting Java applet allow including into jnlp file in the field indicating applet to be executed. By manipulating this field an attacker can force user’s station to load arbitrary applet and fully control it’s arguments.
How to fix
Update your sofware up to the latest version
Advisory status
12.02.2015 - Vendor gets vulnerability details
09.03.2015 - Vendor releases fixed version and details
11.03.2015 - Public disclosure
Credits
The vulnerability was detected by Evgeny Druzhinin and Alexey Osipov, Positive Research Center (Positive Technologies Company)
References
http://en.securitylab.ru/lab/PT-2015-04
Reports on the vulnerabilities previously discovered by Positive Research:
http://www.ptsecurity.com/research/advisory/
http://en.securitylab.ru/lab/