PT-2015-04: JNLP File Inclusion in Inductive Automation Ignition
Inductive Automation Ignition
Version: 7.7.3 and earlier
Severity level: High
Impact: JNLP File Inclusion
Access Vector: Remote
Base Score: 7.3
CVE: not assigned
Inductive Automation Ignition is a cross-platform HMI, SCADA, and MES solution.
The specialists of the Positive Research center have detected a JNLP File Inclusion vulnerability in Inductive Automation Ignition.
Adding any symbols to users’ web request for starting Java applet allow including into jnlp file in the field indicating applet to be executed. By manipulating this field an attacker can force user’s station to load arbitrary applet and fully control it’s arguments.
How to fix
Update your sofware up to the latest version
12.02.2015 - Vendor gets vulnerability details
09.03.2015 - Vendor releases fixed version and details
11.03.2015 - Public disclosure
The vulnerability was detected by Evgeny Druzhinin and Alexey Osipov, Positive Research Center (Positive Technologies Company)
Reports on the vulnerabilities previously discovered by Positive Research: