Advisory Details

January 19th, 2019

LAquis SCADA Web Server acompanhamentotela PAGINA Command Injection Remote Code Execution Vulnerability

ZDI-19-062
ZDI-CAN-6672

CVE ID CVE-2018-18992
CVSS SCORE 7.5, AV:N/AC:L/Au:N/C:P/I:P/A:P
AFFECTED VENDORS LAquis SCADA
AFFECTED PRODUCTS Software
VULNERABILITY DETAILS


This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of LAquis SCADA Software. Authentication is not required to exploit this vulnerability.

The specific flaw exists within the processing of calls to acompanhamentotela.lhtml. When parsing the PAGINA Element, the process does not properly sanitize user-supplied data, which can lead to the injection of an arbitrary script. An attacker can leverage this vulnerability to execute code in the context of the aq process.

ADDITIONAL DETAILS LAquis SCADA has issued an update to correct this vulnerability. More details can be found at:
https://ics-cert.us-cert.gov/advisories/ICSA-19-015-01
DISCLOSURE TIMELINE
  • 2018-08-14 - Vulnerability reported to vendor
  • 2019-01-19 - Coordinated public release of advisory
  • 2019-01-19 - Advisory Updated
CREDIT Esteban Ruiz (mr_me) of Source Incite
BACK TO ADVISORIES