PT-2015-04: JNLP File Inclusion in Inductive Automation Ignition

Vulnerable software

Inductive Automation Ignition
Version: 7.7.3 and earlier

Link:
https://www.inductiveautomation.com/

Severity level

Severity level: High
Impact: JNLP File Inclusion
Access Vector: Remote

CVSS v2:
Base Score: 7.3
Vector: (AV:N/AC:H/Au:N/C:C/I:C/A:P)

CVE: not assigned

Software description

Inductive Automation Ignition is a cross-platform HMI, SCADA, and MES solution.

Vulnerability description

The specialists of the Positive Research center have detected a JNLP File Inclusion vulnerability in Inductive Automation Ignition.

Adding any symbols to users’ web request for starting Java applet allow including into jnlp file in the field indicating applet to be executed. By manipulating this field an attacker can force user’s station to load arbitrary applet and fully control it’s arguments.

How to fix

Update your sofware up to the latest version

Advisory status

12.02.2015 - Vendor gets vulnerability details
09.03.2015 - Vendor releases fixed version and details
11.03.2015 - Public disclosure

Credits

The vulnerability was detected by Evgeny Druzhinin and Alexey Osipov, Positive Research Center (Positive Technologies Company)

References

http://en.securitylab.ru/lab/PT-2015-04

Reports on the vulnerabilities previously discovered by Positive Research:

http://www.ptsecurity.com/research/advisory/
http://en.securitylab.ru/lab/

Threatscape
4G and 5G are not ready for smart cities