ID

VAR-201204-0145


CVE

CVE-2012-0228


TITLE

Invensys Wonderware Information Server Vulnerable to access restrictions

Trust: 0.8

sources: JVNDB: JVNDB-2012-001986

DESCRIPTION

Invensys Wonderware Information Server 4.0 SP1 and 4.5 does not properly implement client controls, which allows remote attackers to bypass intended access restrictions via unspecified vectors. Invensys Wonderware Information Server is a graphical visualization, reporting and analysis of real-time network-based plant operations data that helps drive productivity across the enterprise. Invensys Wonderware Information Server is prone to multiple security vulnerabilities, including: 1. A cross-site scripting vulnerability 2. A SQL-injection vulnerability 3. A security-bypass vulnerability Attackers can leverage these issues to execute arbitrary script code in the browser of an unsuspecting user in the context of an affected site, steal cookie-based authentication credentials, perform unauthorized actions, obtain sensitive information, redirect a user to a potentially malicious site, cause a denial-of-service condition and compromise the application, access or modify data, or exploit latent vulnerabilities in the underlying database. Other attacks are also possible. ---------------------------------------------------------------------- Become a PSI 3.0 beta tester! Test-drive the new beta version and tell us what you think about its extended automatic update function and significantly enhanced user-interface. Download it here! http://secunia.com/psi_30_beta_launch ---------------------------------------------------------------------- TITLE: Invensys Wonderware Products Multiple Vulnerabilities SECUNIA ADVISORY ID: SA48603 VERIFY ADVISORY: Secunia.com http://secunia.com/advisories/48603/ Customer Area (Credentials Required) https://ca.secunia.com/?page=viewadvisory&vuln_id=48603 RELEASE DATE: 2012-04-03 DISCUSS ADVISORY: http://secunia.com/advisories/48603/#comments AVAILABLE ON SITE AND IN CUSTOMER AREA: * Last Update * Popularity * Comments * Criticality Level * Impact * Where * Solution Status * Operating System / Software * CVE Reference(s) http://secunia.com/advisories/48603/ ONLY AVAILABLE IN CUSTOMER AREA: * Authentication Level * Report Reliability * Secunia PoC * Secunia Analysis * Systems Affected * Approve Distribution * Remediation Status * Secunia CVSS Score * CVSS https://ca.secunia.com/?page=viewadvisory&vuln_id=48603 ONLY AVAILABLE WITH SECUNIA CSI AND SECUNIA PSI: * AUTOMATED SCANNING http://secunia.com/vulnerability_scanning/personal/ http://secunia.com/vulnerability_scanning/corporate/wsus_sccm_3rd_third_party_patching/ DESCRIPTION: Multiple vulnerabilities have been reported in Wonderware Information Server and Invensys Wonderware Historian Client, which can be exploited by malicious people to conduct cross-site scripting attacks, conduct SQL injection attacks, bypass certain security restrictions, and compromise a vulnerable system. 1) Certain unspecified input is not properly sanitised before being returned to the user. This can be exploited to execute arbitrary HTML and script code in a user's browser session in context of an affected site. 2) Certain unspecified input is not properly sanitised before being used in SQL queries. This can be exploited to manipulate SQL queries by injecting arbitrary SQL code. Successful exploitation may allow execution of arbitrary code. The vulnerabilities are reported in Wonderware Information Server versions 4.0 SP1 and 4.5 and Invensys Wonderware Historian Client versions prior to 10 SP3. SOLUTION: Install patch. Please see original advisory for more information. PROVIDED AND/OR DISCOVERED BY: ICS-CERT credits Terry McCorkle and Billy Rios. ORIGINAL ADVISORY: http://www.us-cert.gov/control_systems/pdf/ICSA-12-062-01.pdf OTHER REFERENCES: Further details available in Customer Area: http://secunia.com/vulnerability_intelligence/ DEEP LINKS: Further details available in Customer Area: http://secunia.com/vulnerability_intelligence/ EXTENDED DESCRIPTION: Further details available in Customer Area: http://secunia.com/vulnerability_intelligence/ EXTENDED SOLUTION: Further details available in Customer Area: http://secunia.com/vulnerability_intelligence/ EXPLOIT: Further details available in Customer Area: http://secunia.com/vulnerability_intelligence/ ---------------------------------------------------------------------- About: This Advisory was delivered by Secunia as a free service to help private users keeping their systems up to date against the latest vulnerabilities. Subscribe: http://secunia.com/advisories/secunia_security_advisories/ Definitions: (Criticality, Where etc.) http://secunia.com/advisories/about_secunia_advisories/ Please Note: Secunia recommends that you verify all advisories you receive by clicking the link. Secunia NEVER sends attached files with advisories. Secunia does not advise people to install third party patches, only use those supplied by the vendor. ---------------------------------------------------------------------- Unsubscribe: Secunia Security Advisories http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org ----------------------------------------------------------------------

Trust: 2.79

sources: NVD: CVE-2012-0228 // JVNDB: JVNDB-2012-001986 // CNVD: CNVD-2012-1743 // BID: 52851 // IVD: f985e8c0-2353-11e6-abef-000c29c66e3d // VULHUB: VHN-53509 // PACKETSTORM: 111526

IOT TAXONOMY

category:['ICS']sub_category: -

Trust: 0.8

sources: IVD: f985e8c0-2353-11e6-abef-000c29c66e3d // CNVD: CNVD-2012-1743

AFFECTED PRODUCTS

vendor:invensysmodel:wonderware information serverscope:eqversion:4.5

Trust: 2.4

vendor:invensysmodel:wonderware information serverscope:eqversion:4.0

Trust: 1.6

vendor:invensysmodel:wonderware information server sp1scope:eqversion:4.0

Trust: 0.9

vendor:invensysmodel:wonderware information server clientscope:eqversion:4.5

Trust: 0.9

vendor:invensysmodel:wonderware information server portalscope:eqversion:4.5

Trust: 0.9

vendor:invensysmodel:wonderware information serverscope:eqversion:4.0 sp1

Trust: 0.8

vendor:wonderware information servermodel: - scope:eqversion:4.0

Trust: 0.2

vendor:wonderware information servermodel: - scope:eqversion:4.5

Trust: 0.2

sources: IVD: f985e8c0-2353-11e6-abef-000c29c66e3d // CNVD: CNVD-2012-1743 // BID: 52851 // JVNDB: JVNDB-2012-001986 // CNNVD: CNNVD-201204-007 // NVD: CVE-2012-0228

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2012-0228
value: HIGH

Trust: 1.0

NVD: CVE-2012-0228
value: HIGH

Trust: 0.8

CNNVD: CNNVD-201204-007
value: HIGH

Trust: 0.6

IVD: f985e8c0-2353-11e6-abef-000c29c66e3d
value: HIGH

Trust: 0.2

VULHUB: VHN-53509
value: HIGH

Trust: 0.1

nvd@nist.gov: CVE-2012-0228
severity: HIGH
baseScore: 7.5
vectorString: AV:N/AC:L/AU:N/C:P/I:P/A:P
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: PARTIAL
availabilityImpact: PARTIAL
exploitabilityScore: 10.0
impactScore: 6.4
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.8

IVD: f985e8c0-2353-11e6-abef-000c29c66e3d
severity: HIGH
baseScore: 7.5
vectorString: AV:N/AC:L/AU:N/C:P/I:P/A:P
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: PARTIAL
availabilityImpact: PARTIAL
exploitabilityScore: 10.0
impactScore: 6.4
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.9 [IVD]

Trust: 0.2

VULHUB: VHN-53509
severity: HIGH
baseScore: 7.5
vectorString: AV:N/AC:L/AU:N/C:P/I:P/A:P
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: PARTIAL
availabilityImpact: PARTIAL
exploitabilityScore: 10.0
impactScore: 6.4
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.1

sources: IVD: f985e8c0-2353-11e6-abef-000c29c66e3d // VULHUB: VHN-53509 // JVNDB: JVNDB-2012-001986 // CNNVD: CNNVD-201204-007 // NVD: CVE-2012-0228

PROBLEMTYPE DATA

problemtype:CWE-264

Trust: 1.9

sources: VULHUB: VHN-53509 // JVNDB: JVNDB-2012-001986 // NVD: CVE-2012-0228

THREAT TYPE

remote

Trust: 0.6

sources: CNNVD: CNNVD-201204-007

TYPE

permissions and access control

Trust: 0.6

sources: CNNVD: CNNVD-201204-007

CONFIGURATIONS

sources: JVNDB: JVNDB-2012-001986

PATCH

title:Top Pageurl:http://global.wonderware.com/EN/Pages/default.aspx

Trust: 0.8

title:ハードウェア・パートナーurl:http://iom.invensys.com/JP/Pages/IOM_HardwarePartners.aspx

Trust: 0.8

title:ソフトウェア・パートナーurl:http://iom.invensys.com/JP/Pages/IOM_SoftwarePartners.aspx

Trust: 0.8

title:Wonderware 日本のパートナーurl:http://global.wonderware.com/JP/Pages/JpPartnersSI.aspx

Trust: 0.8

title:Wonderware Top Pageurl:http://iom.invensys.com/JP/Pages/home.aspx

Trust: 0.8

title:Patch for Invensys Wonderware Information Server client Access Vulnerabilityurl:https://www.cnvd.org.cn/patchInfo/show/15254

Trust: 0.6

sources: CNVD: CNVD-2012-1743 // JVNDB: JVNDB-2012-001986

EXTERNAL IDS

db:NVDid:CVE-2012-0228

Trust: 3.6

db:ICS CERTid:ICSA-12-062-01

Trust: 3.5

db:SECUNIAid:48603

Trust: 1.9

db:BIDid:52851

Trust: 1.4

db:SECTRACKid:1026887

Trust: 1.1

db:SECTRACKid:1026886

Trust: 1.1

db:OSVDBid:80890

Trust: 1.1

db:CNNVDid:CNNVD-201204-007

Trust: 0.9

db:CNVDid:CNVD-2012-1743

Trust: 0.8

db:JVNDBid:JVNDB-2012-001986

Trust: 0.8

db:IVDid:F985E8C0-2353-11E6-ABEF-000C29C66E3D

Trust: 0.2

db:VULHUBid:VHN-53509

Trust: 0.1

db:PACKETSTORMid:111526

Trust: 0.1

sources: IVD: f985e8c0-2353-11e6-abef-000c29c66e3d // CNVD: CNVD-2012-1743 // VULHUB: VHN-53509 // BID: 52851 // JVNDB: JVNDB-2012-001986 // PACKETSTORM: 111526 // CNNVD: CNNVD-201204-007 // NVD: CVE-2012-0228

REFERENCES

url:http://www.us-cert.gov/control_systems/pdf/icsa-12-062-01.pdf

Trust: 3.5

url:http://secunia.com/advisories/48603

Trust: 1.7

url:http://www.securityfocus.com/bid/52851

Trust: 1.1

url:http://osvdb.org/80890

Trust: 1.1

url:http://www.securitytracker.com/id?1026886

Trust: 1.1

url:http://www.securitytracker.com/id?1026887

Trust: 1.1

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2012-0228

Trust: 0.8

url:http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2012-0228

Trust: 0.8

url:global.wonderware.com/en/pages/default.aspx

Trust: 0.3

url:http://secunia.com/psi_30_beta_launch

Trust: 0.1

url:http://secunia.com/vulnerability_intelligence/

Trust: 0.1

url:https://ca.secunia.com/?page=viewadvisory&vuln_id=48603

Trust: 0.1

url:http://secunia.com/vulnerability_scanning/corporate/wsus_sccm_3rd_third_party_patching/

Trust: 0.1

url:http://secunia.com/advisories/secunia_security_advisories/

Trust: 0.1

url:http://secunia.com/vulnerability_scanning/personal/

Trust: 0.1

url:http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org

Trust: 0.1

url:http://secunia.com/advisories/48603/#comments

Trust: 0.1

url:http://secunia.com/advisories/48603/

Trust: 0.1

url:http://secunia.com/advisories/about_secunia_advisories/

Trust: 0.1

sources: CNVD: CNVD-2012-1743 // VULHUB: VHN-53509 // BID: 52851 // JVNDB: JVNDB-2012-001986 // PACKETSTORM: 111526 // CNNVD: CNNVD-201204-007 // NVD: CVE-2012-0228

CREDITS

Terry McCorkle and Billy Rios

Trust: 0.3

sources: BID: 52851

SOURCES

db:IVDid:f985e8c0-2353-11e6-abef-000c29c66e3d
db:CNVDid:CNVD-2012-1743
db:VULHUBid:VHN-53509
db:BIDid:52851
db:JVNDBid:JVNDB-2012-001986
db:PACKETSTORMid:111526
db:CNNVDid:CNNVD-201204-007
db:NVDid:CVE-2012-0228

LAST UPDATE DATE

2025-04-11T23:12:57.890000+00:00


SOURCES UPDATE DATE

db:CNVDid:CNVD-2012-1743date:2012-04-06T00:00:00
db:VULHUBid:VHN-53509date:2018-01-06T00:00:00
db:BIDid:52851date:2012-04-02T00:00:00
db:JVNDBid:JVNDB-2012-001986date:2012-04-04T00:00:00
db:CNNVDid:CNNVD-201204-007date:2012-04-05T00:00:00
db:NVDid:CVE-2012-0228date:2025-04-11T00:51:21.963

SOURCES RELEASE DATE

db:IVDid:f985e8c0-2353-11e6-abef-000c29c66e3ddate:2012-04-06T00:00:00
db:CNVDid:CNVD-2012-1743date:2012-04-06T00:00:00
db:VULHUBid:VHN-53509date:2012-04-02T00:00:00
db:BIDid:52851date:2012-04-02T00:00:00
db:JVNDBid:JVNDB-2012-001986date:2012-04-04T00:00:00
db:PACKETSTORMid:111526date:2012-04-03T05:45:09
db:CNNVDid:CNNVD-201204-007date:2012-04-05T00:00:00
db:NVDid:CVE-2012-0228date:2012-04-02T20:55:01.903