1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 |
############################################################################## # # Title: Advantech WebAccess HMI/SCADA Software Persistence Cross-Site #Scripting Vulnerability # Author : Antu Sanadi SecPod Technologies (www.secpod.com) # Vendor : http://webaccess.advantech.com/ # Advisory : http://secpod.org/blog/?p=569 # http://secpod.org/advisories/SecPod_Advantech_WebAccess_Stored_XSS_Vuln.txt # Software : Advantech WebAccess HMI/SCADA Software 7.0-2012.12.05 # Date : 08/01/2013 # ############################################################################### SecPod ID: 1046 10/12/2012 Issue Discovered 18/12/2012 Vendor Notified No Response from vendor 08/01/2013 Advisory Released Class: Cross-Site Scripting Severity: High Overview: --------- Advantech WebAccess HMI/SCADA Software Persistence Cross-Site Scripting Vulnerability. Technical Description: ---------------------- Advantech WebAccess HMI/SCADA Software Persistence Cross-Site Scripting Vulnerability. Input passed via the 'ProjDesc' parameter in 'broadWeb/include/gAddNew.asp' (when tableName=pProject set) page is not properly verified before it is returned to the user. This can be exploited to execute arbitrary HTML and script code in a user's browser session in the context of a vulnerable site. The vulnerabilities are tested in Advantech WebAccess 7.0-2012.12.05 Other versionsmay also be affected. Impact: -------- Successful exploitation will allow a remote authenticated attacker to execute arbitrary HTML code in a user's browser session in the context of a vulnerable application. Affected Software: ------------------ Advantech WebAccess HMI/SCADA Software 7.0-2012.12.05 Tested on Advantech WebAccess HMI/SCADA Software 7.0-2012.12.05 on Windows XP SP3 References: ----------- http://secpod.org/blog/?p=569 http://webaccess.advantech.com http://secpod.org/advisories/SecPod_Advantech_WebAccess_Stored_XSS_Vuln.txt Proof of Concept: ----------------- 1) Login into project management interface http://IP-Address/broadWeb/bwconfig.asp?username=admin 2) Go to http://IP-Address/broadweb/bwproj.asp 3) Create New Project with Project Description as <script>alert("XSS")<script> 4) Now Java script '<script>alert("XSS")<script>' will be executed, when 'bwproj.asp' will be loaded Solution: ---------- Fix not available Risk Factor: ------------- CVSS Score Report: ACCESS_VECTOR= NETWORK ACCESS_COMPLEXITY= MEDIUM AUTHENTICATION = SINGLE INSTANCE CONFIDENTIALITY_IMPACT = NONE INTEGRITY_IMPACT = COMPLETE AVAILABILITY_IMPACT= NONE EXPLOITABILITY = PROOF_OF_CONCEPT REMEDIATION_LEVEL= UNAVAILABLE REPORT_CONFIDENCE= CONFIRMED CVSS Base Score= 6.3 (High) (AV:N/AC:M/Au:SI/C:N/I:C/A:N) Credits: -------- Antu Sanadi of SecPod Technologies has been credited with the discovery of this vulnerability. |