ID

VAR-201204-0175


CVE

CVE-2012-0225


TITLE

Invensys Wonderware Information Server Cross-Site Scripting Vulnerability

Trust: 1.4

sources: IVD: f99a817c-2353-11e6-abef-000c29c66e3d // CNVD: CNVD-2012-1747 // CNNVD: CNNVD-201204-005

DESCRIPTION

Cross-site scripting (XSS) vulnerability in Invensys Wonderware Information Server 4.0 SP1 and 4.5 allows remote attackers to inject arbitrary web script or HTML via unspecified vectors. Invensys Wonderware Information Server is a graphical visualization, reporting and analysis of real-time network-based plant operations data that helps drive productivity across the enterprise. Invensys Wonderware Information Server is prone to multiple security vulnerabilities, including: 1. A cross-site scripting vulnerability 2. A SQL-injection vulnerability 3. A security-bypass vulnerability Attackers can leverage these issues to execute arbitrary script code in the browser of an unsuspecting user in the context of an affected site, steal cookie-based authentication credentials, perform unauthorized actions, obtain sensitive information, redirect a user to a potentially malicious site, cause a denial-of-service condition and compromise the application, access or modify data, or exploit latent vulnerabilities in the underlying database. Other attacks are also possible. ---------------------------------------------------------------------- Become a PSI 3.0 beta tester! Test-drive the new beta version and tell us what you think about its extended automatic update function and significantly enhanced user-interface. Download it here! http://secunia.com/psi_30_beta_launch ---------------------------------------------------------------------- TITLE: Invensys Wonderware Products Multiple Vulnerabilities SECUNIA ADVISORY ID: SA48603 VERIFY ADVISORY: Secunia.com http://secunia.com/advisories/48603/ Customer Area (Credentials Required) https://ca.secunia.com/?page=viewadvisory&vuln_id=48603 RELEASE DATE: 2012-04-03 DISCUSS ADVISORY: http://secunia.com/advisories/48603/#comments AVAILABLE ON SITE AND IN CUSTOMER AREA: * Last Update * Popularity * Comments * Criticality Level * Impact * Where * Solution Status * Operating System / Software * CVE Reference(s) http://secunia.com/advisories/48603/ ONLY AVAILABLE IN CUSTOMER AREA: * Authentication Level * Report Reliability * Secunia PoC * Secunia Analysis * Systems Affected * Approve Distribution * Remediation Status * Secunia CVSS Score * CVSS https://ca.secunia.com/?page=viewadvisory&vuln_id=48603 ONLY AVAILABLE WITH SECUNIA CSI AND SECUNIA PSI: * AUTOMATED SCANNING http://secunia.com/vulnerability_scanning/personal/ http://secunia.com/vulnerability_scanning/corporate/wsus_sccm_3rd_third_party_patching/ DESCRIPTION: Multiple vulnerabilities have been reported in Wonderware Information Server and Invensys Wonderware Historian Client, which can be exploited by malicious people to conduct cross-site scripting attacks, conduct SQL injection attacks, bypass certain security restrictions, and compromise a vulnerable system. 1) Certain unspecified input is not properly sanitised before being returned to the user. This can be exploited to execute arbitrary HTML and script code in a user's browser session in context of an affected site. 2) Certain unspecified input is not properly sanitised before being used in SQL queries. This can be exploited to manipulate SQL queries by injecting arbitrary SQL code. 3) An unspecified error in client controls can be exploited to bypass certain security restrictions. Successful exploitation may allow execution of arbitrary code. The vulnerabilities are reported in Wonderware Information Server versions 4.0 SP1 and 4.5 and Invensys Wonderware Historian Client versions prior to 10 SP3. SOLUTION: Install patch. Please see original advisory for more information. PROVIDED AND/OR DISCOVERED BY: ICS-CERT credits Terry McCorkle and Billy Rios. ORIGINAL ADVISORY: http://www.us-cert.gov/control_systems/pdf/ICSA-12-062-01.pdf OTHER REFERENCES: Further details available in Customer Area: http://secunia.com/vulnerability_intelligence/ DEEP LINKS: Further details available in Customer Area: http://secunia.com/vulnerability_intelligence/ EXTENDED DESCRIPTION: Further details available in Customer Area: http://secunia.com/vulnerability_intelligence/ EXTENDED SOLUTION: Further details available in Customer Area: http://secunia.com/vulnerability_intelligence/ EXPLOIT: Further details available in Customer Area: http://secunia.com/vulnerability_intelligence/ ---------------------------------------------------------------------- About: This Advisory was delivered by Secunia as a free service to help private users keeping their systems up to date against the latest vulnerabilities. Subscribe: http://secunia.com/advisories/secunia_security_advisories/ Definitions: (Criticality, Where etc.) http://secunia.com/advisories/about_secunia_advisories/ Please Note: Secunia recommends that you verify all advisories you receive by clicking the link. Secunia NEVER sends attached files with advisories. Secunia does not advise people to install third party patches, only use those supplied by the vendor. ---------------------------------------------------------------------- Unsubscribe: Secunia Security Advisories http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org ----------------------------------------------------------------------

Trust: 2.79

sources: NVD: CVE-2012-0225 // JVNDB: JVNDB-2012-001984 // CNVD: CNVD-2012-1747 // BID: 52851 // IVD: f99a817c-2353-11e6-abef-000c29c66e3d // VULHUB: VHN-53506 // PACKETSTORM: 111526

IOT TAXONOMY

category:['ICS']sub_category: -

Trust: 0.8

sources: IVD: f99a817c-2353-11e6-abef-000c29c66e3d // CNVD: CNVD-2012-1747

AFFECTED PRODUCTS

vendor:invensysmodel:wonderware information serverscope:eqversion:4.5

Trust: 2.4

vendor:invensysmodel:wonderware information serverscope:eqversion:4.0

Trust: 1.6

vendor:invensysmodel:wonderware information server sp1scope:eqversion:4.0

Trust: 0.9

vendor:invensysmodel:wonderware information server clientscope:eqversion:4.5

Trust: 0.9

vendor:invensysmodel:wonderware information server portalscope:eqversion:4.5

Trust: 0.9

vendor:invensysmodel:wonderware information serverscope:eqversion:4.0 sp1

Trust: 0.8

vendor:wonderware information servermodel: - scope:eqversion:4.0

Trust: 0.2

vendor:wonderware information servermodel: - scope:eqversion:4.5

Trust: 0.2

sources: IVD: f99a817c-2353-11e6-abef-000c29c66e3d // CNVD: CNVD-2012-1747 // BID: 52851 // JVNDB: JVNDB-2012-001984 // CNNVD: CNNVD-201204-005 // NVD: CVE-2012-0225

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2012-0225
value: MEDIUM

Trust: 1.0

NVD: CVE-2012-0225
value: MEDIUM

Trust: 0.8

CNNVD: CNNVD-201204-005
value: MEDIUM

Trust: 0.6

IVD: f99a817c-2353-11e6-abef-000c29c66e3d
value: MEDIUM

Trust: 0.2

VULHUB: VHN-53506
value: MEDIUM

Trust: 0.1

nvd@nist.gov: CVE-2012-0225
severity: MEDIUM
baseScore: 4.3
vectorString: AV:N/AC:M/AU:N/C:N/I:P/A:N
accessVector: NETWORK
accessComplexity: MEDIUM
authentication: NONE
confidentialityImpact: NONE
integrityImpact: PARTIAL
availabilityImpact: NONE
exploitabilityScore: 8.6
impactScore: 2.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.8

IVD: f99a817c-2353-11e6-abef-000c29c66e3d
severity: MEDIUM
baseScore: 4.3
vectorString: AV:N/AC:M/AU:N/C:N/I:P/A:N
accessVector: NETWORK
accessComplexity: MEDIUM
authentication: NONE
confidentialityImpact: NONE
integrityImpact: PARTIAL
availabilityImpact: NONE
exploitabilityScore: 8.6
impactScore: 2.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.9 [IVD]

Trust: 0.2

VULHUB: VHN-53506
severity: MEDIUM
baseScore: 4.3
vectorString: AV:N/AC:M/AU:N/C:N/I:P/A:N
accessVector: NETWORK
accessComplexity: MEDIUM
authentication: NONE
confidentialityImpact: NONE
integrityImpact: PARTIAL
availabilityImpact: NONE
exploitabilityScore: 8.6
impactScore: 2.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.1

sources: IVD: f99a817c-2353-11e6-abef-000c29c66e3d // VULHUB: VHN-53506 // JVNDB: JVNDB-2012-001984 // CNNVD: CNNVD-201204-005 // NVD: CVE-2012-0225

PROBLEMTYPE DATA

problemtype:CWE-79

Trust: 1.9

sources: VULHUB: VHN-53506 // JVNDB: JVNDB-2012-001984 // NVD: CVE-2012-0225

THREAT TYPE

remote

Trust: 0.6

sources: CNNVD: CNNVD-201204-005

TYPE

XSS

Trust: 0.6

sources: CNNVD: CNNVD-201204-005

CONFIGURATIONS

sources: JVNDB: JVNDB-2012-001984

PATCH

title:Top Pageurl:http://global.wonderware.com/EN/Pages/default.aspx

Trust: 0.8

title:ハードウェア・パートナーurl:http://iom.invensys.com/JP/Pages/IOM_HardwarePartners.aspx

Trust: 0.8

title:ソフトウェア・パートナーurl:http://iom.invensys.com/JP/Pages/IOM_SoftwarePartners.aspx

Trust: 0.8

title:Wonderware 日本のパートナーurl:http://global.wonderware.com/JP/Pages/JpPartnersSI.aspx

Trust: 0.8

title:Wonderware Top Pageurl:http://iom.invensys.com/JP/Pages/home.aspx

Trust: 0.8

title:Patch for Invensys Wonderware Information Server Cross-Site Scripting Vulnerabilityurl:https://www.cnvd.org.cn/patchInfo/show/15252

Trust: 0.6

sources: CNVD: CNVD-2012-1747 // JVNDB: JVNDB-2012-001984

EXTERNAL IDS

db:NVDid:CVE-2012-0225

Trust: 3.6

db:ICS CERTid:ICSA-12-062-01

Trust: 3.5

db:SECUNIAid:48603

Trust: 1.9

db:BIDid:52851

Trust: 1.4

db:SECTRACKid:1026886

Trust: 1.1

db:SECTRACKid:1026887

Trust: 1.1

db:OSVDBid:80888

Trust: 1.1

db:CNNVDid:CNNVD-201204-005

Trust: 0.9

db:CNVDid:CNVD-2012-1747

Trust: 0.8

db:JVNDBid:JVNDB-2012-001984

Trust: 0.8

db:IVDid:F99A817C-2353-11E6-ABEF-000C29C66E3D

Trust: 0.2

db:VULHUBid:VHN-53506

Trust: 0.1

db:PACKETSTORMid:111526

Trust: 0.1

sources: IVD: f99a817c-2353-11e6-abef-000c29c66e3d // CNVD: CNVD-2012-1747 // VULHUB: VHN-53506 // BID: 52851 // JVNDB: JVNDB-2012-001984 // PACKETSTORM: 111526 // CNNVD: CNNVD-201204-005 // NVD: CVE-2012-0225

REFERENCES

url:http://www.us-cert.gov/control_systems/pdf/icsa-12-062-01.pdf

Trust: 3.5

url:http://secunia.com/advisories/48603

Trust: 1.7

url:http://www.securityfocus.com/bid/52851

Trust: 1.1

url:http://osvdb.org/80888

Trust: 1.1

url:http://www.securitytracker.com/id?1026886

Trust: 1.1

url:http://www.securitytracker.com/id?1026887

Trust: 1.1

url:https://exchange.xforce.ibmcloud.com/vulnerabilities/74549

Trust: 1.1

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2012-0225

Trust: 0.8

url:http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2012-0225

Trust: 0.8

url:global.wonderware.com/en/pages/default.aspx

Trust: 0.3

url:http://secunia.com/psi_30_beta_launch

Trust: 0.1

url:http://secunia.com/vulnerability_intelligence/

Trust: 0.1

url:https://ca.secunia.com/?page=viewadvisory&vuln_id=48603

Trust: 0.1

url:http://secunia.com/vulnerability_scanning/corporate/wsus_sccm_3rd_third_party_patching/

Trust: 0.1

url:http://secunia.com/advisories/secunia_security_advisories/

Trust: 0.1

url:http://secunia.com/vulnerability_scanning/personal/

Trust: 0.1

url:http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org

Trust: 0.1

url:http://secunia.com/advisories/48603/#comments

Trust: 0.1

url:http://secunia.com/advisories/48603/

Trust: 0.1

url:http://secunia.com/advisories/about_secunia_advisories/

Trust: 0.1

sources: CNVD: CNVD-2012-1747 // VULHUB: VHN-53506 // BID: 52851 // JVNDB: JVNDB-2012-001984 // PACKETSTORM: 111526 // CNNVD: CNNVD-201204-005 // NVD: CVE-2012-0225

CREDITS

Terry McCorkle and Billy Rios

Trust: 0.3

sources: BID: 52851

SOURCES

db:IVDid:f99a817c-2353-11e6-abef-000c29c66e3d
db:CNVDid:CNVD-2012-1747
db:VULHUBid:VHN-53506
db:BIDid:52851
db:JVNDBid:JVNDB-2012-001984
db:PACKETSTORMid:111526
db:CNNVDid:CNNVD-201204-005
db:NVDid:CVE-2012-0225

LAST UPDATE DATE

2025-04-11T23:12:57.934000+00:00


SOURCES UPDATE DATE

db:CNVDid:CNVD-2012-1747date:2012-04-06T00:00:00
db:VULHUBid:VHN-53506date:2018-01-06T00:00:00
db:BIDid:52851date:2012-04-02T00:00:00
db:JVNDBid:JVNDB-2012-001984date:2012-04-04T00:00:00
db:CNNVDid:CNNVD-201204-005date:2012-04-05T00:00:00
db:NVDid:CVE-2012-0225date:2025-04-11T00:51:21.963

SOURCES RELEASE DATE

db:IVDid:f99a817c-2353-11e6-abef-000c29c66e3ddate:2012-04-06T00:00:00
db:CNVDid:CNVD-2012-1747date:2012-04-06T00:00:00
db:VULHUBid:VHN-53506date:2012-04-02T00:00:00
db:BIDid:52851date:2012-04-02T00:00:00
db:JVNDBid:JVNDB-2012-001984date:2012-04-04T00:00:00
db:PACKETSTORMid:111526date:2012-04-03T05:45:09
db:CNNVDid:CNNVD-201204-005date:2012-04-05T00:00:00
db:NVDid:CVE-2012-0225date:2012-04-02T20:55:01.793