ID

VAR-201204-0176


CVE

CVE-2012-0226


TITLE

Invensys Wonderware Information Server SQL Injection Vulnerability

Trust: 1.2

sources: CNVD: CNVD-2012-1744 // CNNVD: CNNVD-201204-006

DESCRIPTION

SQL injection vulnerability in Invensys Wonderware Information Server 4.0 SP1 and 4.5 allows remote attackers to execute arbitrary SQL commands via unspecified vectors. Invensys Wonderware Information Server is a graphical visualization, reporting and analysis of real-time network-based plant operations data that helps drive productivity across the enterprise. Invensys Wonderware Information Server is prone to multiple security vulnerabilities, including: 1. A cross-site scripting vulnerability 2. A SQL-injection vulnerability 3. A security-bypass vulnerability Attackers can leverage these issues to execute arbitrary script code in the browser of an unsuspecting user in the context of an affected site, steal cookie-based authentication credentials, perform unauthorized actions, obtain sensitive information, redirect a user to a potentially malicious site, cause a denial-of-service condition and compromise the application, access or modify data, or exploit latent vulnerabilities in the underlying database. Other attacks are also possible. ---------------------------------------------------------------------- Become a PSI 3.0 beta tester! Test-drive the new beta version and tell us what you think about its extended automatic update function and significantly enhanced user-interface. Download it here! http://secunia.com/psi_30_beta_launch ---------------------------------------------------------------------- TITLE: Invensys Wonderware Products Multiple Vulnerabilities SECUNIA ADVISORY ID: SA48603 VERIFY ADVISORY: Secunia.com http://secunia.com/advisories/48603/ Customer Area (Credentials Required) https://ca.secunia.com/?page=viewadvisory&vuln_id=48603 RELEASE DATE: 2012-04-03 DISCUSS ADVISORY: http://secunia.com/advisories/48603/#comments AVAILABLE ON SITE AND IN CUSTOMER AREA: * Last Update * Popularity * Comments * Criticality Level * Impact * Where * Solution Status * Operating System / Software * CVE Reference(s) http://secunia.com/advisories/48603/ ONLY AVAILABLE IN CUSTOMER AREA: * Authentication Level * Report Reliability * Secunia PoC * Secunia Analysis * Systems Affected * Approve Distribution * Remediation Status * Secunia CVSS Score * CVSS https://ca.secunia.com/?page=viewadvisory&vuln_id=48603 ONLY AVAILABLE WITH SECUNIA CSI AND SECUNIA PSI: * AUTOMATED SCANNING http://secunia.com/vulnerability_scanning/personal/ http://secunia.com/vulnerability_scanning/corporate/wsus_sccm_3rd_third_party_patching/ DESCRIPTION: Multiple vulnerabilities have been reported in Wonderware Information Server and Invensys Wonderware Historian Client, which can be exploited by malicious people to conduct cross-site scripting attacks, conduct SQL injection attacks, bypass certain security restrictions, and compromise a vulnerable system. 1) Certain unspecified input is not properly sanitised before being returned to the user. This can be exploited to execute arbitrary HTML and script code in a user's browser session in context of an affected site. 2) Certain unspecified input is not properly sanitised before being used in SQL queries. This can be exploited to manipulate SQL queries by injecting arbitrary SQL code. 3) An unspecified error in client controls can be exploited to bypass certain security restrictions. Successful exploitation may allow execution of arbitrary code. The vulnerabilities are reported in Wonderware Information Server versions 4.0 SP1 and 4.5 and Invensys Wonderware Historian Client versions prior to 10 SP3. SOLUTION: Install patch. Please see original advisory for more information. PROVIDED AND/OR DISCOVERED BY: ICS-CERT credits Terry McCorkle and Billy Rios. ORIGINAL ADVISORY: http://www.us-cert.gov/control_systems/pdf/ICSA-12-062-01.pdf OTHER REFERENCES: Further details available in Customer Area: http://secunia.com/vulnerability_intelligence/ DEEP LINKS: Further details available in Customer Area: http://secunia.com/vulnerability_intelligence/ EXTENDED DESCRIPTION: Further details available in Customer Area: http://secunia.com/vulnerability_intelligence/ EXTENDED SOLUTION: Further details available in Customer Area: http://secunia.com/vulnerability_intelligence/ EXPLOIT: Further details available in Customer Area: http://secunia.com/vulnerability_intelligence/ ---------------------------------------------------------------------- About: This Advisory was delivered by Secunia as a free service to help private users keeping their systems up to date against the latest vulnerabilities. Subscribe: http://secunia.com/advisories/secunia_security_advisories/ Definitions: (Criticality, Where etc.) http://secunia.com/advisories/about_secunia_advisories/ Please Note: Secunia recommends that you verify all advisories you receive by clicking the link. Secunia NEVER sends attached files with advisories. Secunia does not advise people to install third party patches, only use those supplied by the vendor. ---------------------------------------------------------------------- Unsubscribe: Secunia Security Advisories http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org ----------------------------------------------------------------------

Trust: 2.79

sources: NVD: CVE-2012-0226 // JVNDB: JVNDB-2012-001985 // CNVD: CNVD-2012-1744 // BID: 52851 // IVD: f98c76e0-2353-11e6-abef-000c29c66e3d // VULHUB: VHN-53507 // PACKETSTORM: 111526

IOT TAXONOMY

category:['ICS']sub_category: -

Trust: 0.8

sources: IVD: f98c76e0-2353-11e6-abef-000c29c66e3d // CNVD: CNVD-2012-1744

AFFECTED PRODUCTS

vendor:invensysmodel:wonderware information serverscope:eqversion:4.5

Trust: 2.4

vendor:invensysmodel:wonderware information serverscope:eqversion:4.0

Trust: 1.6

vendor:invensysmodel:wonderware information server sp1scope:eqversion:4.0

Trust: 0.9

vendor:invensysmodel:wonderware information server clientscope:eqversion:4.5

Trust: 0.9

vendor:invensysmodel:wonderware information server portalscope:eqversion:4.5

Trust: 0.9

vendor:invensysmodel:wonderware information serverscope:eqversion:4.0 sp1

Trust: 0.8

vendor:wonderware information servermodel: - scope:eqversion:4.0

Trust: 0.2

vendor:wonderware information servermodel: - scope:eqversion:4.5

Trust: 0.2

sources: IVD: f98c76e0-2353-11e6-abef-000c29c66e3d // CNVD: CNVD-2012-1744 // BID: 52851 // JVNDB: JVNDB-2012-001985 // CNNVD: CNNVD-201204-006 // NVD: CVE-2012-0226

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2012-0226
value: HIGH

Trust: 1.0

NVD: CVE-2012-0226
value: HIGH

Trust: 0.8

CNNVD: CNNVD-201204-006
value: HIGH

Trust: 0.6

IVD: f98c76e0-2353-11e6-abef-000c29c66e3d
value: HIGH

Trust: 0.2

VULHUB: VHN-53507
value: HIGH

Trust: 0.1

nvd@nist.gov: CVE-2012-0226
severity: HIGH
baseScore: 7.5
vectorString: AV:N/AC:L/AU:N/C:P/I:P/A:P
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: PARTIAL
availabilityImpact: PARTIAL
exploitabilityScore: 10.0
impactScore: 6.4
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.8

IVD: f98c76e0-2353-11e6-abef-000c29c66e3d
severity: HIGH
baseScore: 7.5
vectorString: AV:N/AC:L/AU:N/C:P/I:P/A:P
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: PARTIAL
availabilityImpact: PARTIAL
exploitabilityScore: 10.0
impactScore: 6.4
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.9 [IVD]

Trust: 0.2

VULHUB: VHN-53507
severity: HIGH
baseScore: 7.5
vectorString: AV:N/AC:L/AU:N/C:P/I:P/A:P
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: PARTIAL
availabilityImpact: PARTIAL
exploitabilityScore: 10.0
impactScore: 6.4
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.1

sources: IVD: f98c76e0-2353-11e6-abef-000c29c66e3d // VULHUB: VHN-53507 // JVNDB: JVNDB-2012-001985 // CNNVD: CNNVD-201204-006 // NVD: CVE-2012-0226

PROBLEMTYPE DATA

problemtype:CWE-89

Trust: 1.9

sources: VULHUB: VHN-53507 // JVNDB: JVNDB-2012-001985 // NVD: CVE-2012-0226

THREAT TYPE

remote

Trust: 0.6

sources: CNNVD: CNNVD-201204-006

TYPE

SQL injection

Trust: 0.8

sources: IVD: f98c76e0-2353-11e6-abef-000c29c66e3d // CNNVD: CNNVD-201204-006

CONFIGURATIONS

sources: JVNDB: JVNDB-2012-001985

PATCH

title:Top Pageurl:http://global.wonderware.com/EN/Pages/default.aspx

Trust: 0.8

title:ハードウェア・パートナーurl:http://iom.invensys.com/JP/Pages/IOM_HardwarePartners.aspx

Trust: 0.8

title:ソフトウェア・パートナーurl:http://iom.invensys.com/JP/Pages/IOM_SoftwarePartners.aspx

Trust: 0.8

title:Wonderware 日本のパートナーurl:http://global.wonderware.com/JP/Pages/JpPartnersSI.aspx

Trust: 0.8

title:Wonderware Top Pageurl:http://iom.invensys.com/JP/Pages/home.aspx

Trust: 0.8

title:Invensys Wonderware Information Server SQL Injection Vulnerability Patchurl:https://www.cnvd.org.cn/patchInfo/show/15253

Trust: 0.6

sources: CNVD: CNVD-2012-1744 // JVNDB: JVNDB-2012-001985

EXTERNAL IDS

db:NVDid:CVE-2012-0226

Trust: 3.6

db:ICS CERTid:ICSA-12-062-01

Trust: 3.5

db:SECUNIAid:48603

Trust: 1.9

db:BIDid:52851

Trust: 1.4

db:OSVDBid:80889

Trust: 1.1

db:SECTRACKid:1026886

Trust: 1.1

db:SECTRACKid:1026887

Trust: 1.1

db:CNNVDid:CNNVD-201204-006

Trust: 0.9

db:CNVDid:CNVD-2012-1744

Trust: 0.8

db:JVNDBid:JVNDB-2012-001985

Trust: 0.8

db:IVDid:F98C76E0-2353-11E6-ABEF-000C29C66E3D

Trust: 0.2

db:VULHUBid:VHN-53507

Trust: 0.1

db:PACKETSTORMid:111526

Trust: 0.1

sources: IVD: f98c76e0-2353-11e6-abef-000c29c66e3d // CNVD: CNVD-2012-1744 // VULHUB: VHN-53507 // BID: 52851 // JVNDB: JVNDB-2012-001985 // PACKETSTORM: 111526 // CNNVD: CNNVD-201204-006 // NVD: CVE-2012-0226

REFERENCES

url:http://www.us-cert.gov/control_systems/pdf/icsa-12-062-01.pdf

Trust: 3.5

url:http://secunia.com/advisories/48603

Trust: 1.7

url:http://www.securityfocus.com/bid/52851

Trust: 1.1

url:http://osvdb.org/80889

Trust: 1.1

url:http://www.securitytracker.com/id?1026886

Trust: 1.1

url:http://www.securitytracker.com/id?1026887

Trust: 1.1

url:https://exchange.xforce.ibmcloud.com/vulnerabilities/74550

Trust: 1.1

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2012-0226

Trust: 0.8

url:http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2012-0226

Trust: 0.8

url:global.wonderware.com/en/pages/default.aspx

Trust: 0.3

url:http://secunia.com/psi_30_beta_launch

Trust: 0.1

url:http://secunia.com/vulnerability_intelligence/

Trust: 0.1

url:https://ca.secunia.com/?page=viewadvisory&vuln_id=48603

Trust: 0.1

url:http://secunia.com/vulnerability_scanning/corporate/wsus_sccm_3rd_third_party_patching/

Trust: 0.1

url:http://secunia.com/advisories/secunia_security_advisories/

Trust: 0.1

url:http://secunia.com/vulnerability_scanning/personal/

Trust: 0.1

url:http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org

Trust: 0.1

url:http://secunia.com/advisories/48603/#comments

Trust: 0.1

url:http://secunia.com/advisories/48603/

Trust: 0.1

url:http://secunia.com/advisories/about_secunia_advisories/

Trust: 0.1

sources: CNVD: CNVD-2012-1744 // VULHUB: VHN-53507 // BID: 52851 // JVNDB: JVNDB-2012-001985 // PACKETSTORM: 111526 // CNNVD: CNNVD-201204-006 // NVD: CVE-2012-0226

CREDITS

Terry McCorkle and Billy Rios

Trust: 0.3

sources: BID: 52851

SOURCES

db:IVDid:f98c76e0-2353-11e6-abef-000c29c66e3d
db:CNVDid:CNVD-2012-1744
db:VULHUBid:VHN-53507
db:BIDid:52851
db:JVNDBid:JVNDB-2012-001985
db:PACKETSTORMid:111526
db:CNNVDid:CNNVD-201204-006
db:NVDid:CVE-2012-0226

LAST UPDATE DATE

2025-04-11T23:12:57.978000+00:00


SOURCES UPDATE DATE

db:CNVDid:CNVD-2012-1744date:2012-04-06T00:00:00
db:VULHUBid:VHN-53507date:2018-01-06T00:00:00
db:BIDid:52851date:2012-04-02T00:00:00
db:JVNDBid:JVNDB-2012-001985date:2012-04-04T00:00:00
db:CNNVDid:CNNVD-201204-006date:2012-04-05T00:00:00
db:NVDid:CVE-2012-0226date:2025-04-11T00:51:21.963

SOURCES RELEASE DATE

db:IVDid:f98c76e0-2353-11e6-abef-000c29c66e3ddate:2012-04-06T00:00:00
db:CNVDid:CNVD-2012-1744date:2012-04-06T00:00:00
db:VULHUBid:VHN-53507date:2012-04-02T00:00:00
db:BIDid:52851date:2012-04-02T00:00:00
db:JVNDBid:JVNDB-2012-001985date:2012-04-04T00:00:00
db:PACKETSTORMid:111526date:2012-04-03T05:45:09
db:CNNVDid:CNNVD-201204-006date:2012-04-05T00:00:00
db:NVDid:CVE-2012-0226date:2012-04-02T20:55:01.857