Advisory Details

August 23rd, 2017

SpiderControl SCADA Webserver iniNet Directory Traversal Information Disclosure Vulnerability

ZDI-17-695
ZDI-CAN-4174

CVE ID CVE-2017-12694
CVSS SCORE 7.8, AV:N/AC:L/Au:N/C:C/I:N/A:N
AFFECTED VENDORS SpiderControl
AFFECTED PRODUCTS SCADA Webserver iniNet
TREND MICRO CUSTOMER PROTECTION Trend Micro TippingPoint IPS customers are protected against this vulnerability by Digital Vaccine protection filter ID ['27216']. For further product information on the TippingPoint IPS: http://www.tippingpoint.com
VULNERABILITY DETAILS


This vulnerability allows remote attackers to disclose sensitive information on vulnerable installations of SpiderControl SCADA. Authentication is not required to exploit this vulnerability.

The specific flaw exists within web server access to the scdefault directory. The issue results from the lack of proper validation of a user-supplied path prior to using it in file operations. An attacker can leverage this vulnerability to disclose files accessible to the SYSTEM account.

ADDITIONAL DETAILS SpiderControl has issued an update to correct this vulnerability. More details can be found at:
https://ics-cert.us-cert.gov/advisories/ICSA-17-234-03
DISCLOSURE TIMELINE
  • 2017-02-10 - Vulnerability reported to vendor
  • 2017-08-23 - Coordinated public release of advisory
CREDIT juushya
BACK TO ADVISORIES