PT-2015-04: JNLP File Inclusion in Inductive Automation Ignition Vulnerable softwareInductive Automation Ignition Version: 7.7.3 and earlierLink: https://www.inductiveautomation.com/Severity levelSeverity level: High Impact: JNLP File Inclusion Access Vector: Remote CVSS v2: Base Score: 7.3 Vector: (AV:N/AC:H/Au:N/C:C/I:C/A:P)CVE: not assignedSoftware descriptionInductive Automation Ignition is a cross-platform HMI, SCADA, and MES solution.Vulnerability descriptionThe specialists of the Positive Research center have detected a JNLP File Inclusion vulnerability in Inductive Automation Ignition.Adding any symbols to users’ web request for starting Java applet allow including into jnlp file in the field indicating applet to be executed. By manipulating this field an attacker can force user’s station to load arbitrary applet and fully control it’s arguments.How to fixUpdate your sofware up to the latest versionAdvisory status 12.02.2015 - Vendor gets vulnerability details 09.03.2015 - Vendor releases fixed version and details 11.03.2015 - Public disclosureCreditsThe vulnerability was detected by Evgeny Druzhinin and Alexey Osipov, Positive Research Center (Positive Technologies Company)References http://en.securitylab.ru/lab/PT-2015-04 Reports on the vulnerabilities previously discovered by Positive Research:http://www.ptsecurity.com/research/advisory/ http://en.securitylab.ru/lab/