Advisory Details

January 14th, 2019

Schneider Electric IIoT Monitor AccountMgmt Login XML External Entity Processing Information Disclosure Vulnerability

ZDI-19-023
ZDI-CAN-7123

CVE ID CVE-2018-7837
CVSS SCORE 7.5, AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
AFFECTED VENDORS Schneider Electric
AFFECTED PRODUCTS IIot Monitor
VULNERABILITY DETAILS

This vulnerability allows remote attackers to disclose sensitive information on vulnerable installations of Schneider Electric IIoT Monitor. Authentication is not required to exploit this vulnerability.

The specific flaw exists in the Login method of the AccountMgmt servlet. Due to the improper restriction of XML External Entity (XXE) references, a specially crafted document specifying a URI causes the XML parser to access the URI and embed the contents back into the XML document for further processing. An attacker can leverage this in conjunction with other vulnerabilities to bypass authentication on the system.

ADDITIONAL DETAILS Schneider Electric has issued an update to correct this vulnerability. More details can be found at:
https://ics-cert.us-cert.gov/advisories/ICSA-19-008-02
DISCLOSURE TIMELINE
  • 2018-08-14 - Vulnerability reported to vendor
  • 2019-01-14 - Coordinated public release of advisory
CREDIT rgod of 9sg Security Team - rgod@9sgsec.com
BACK TO ADVISORIES