Advisory Details

January 19th, 2019

LAquis SCADA Web Server relatorionome NOME Command Injection Remote Code Execution Vulnerability

ZDI-19-066
ZDI-CAN-6676

CVE ID CVE-2018-18996
CVSS SCORE 7.5, (AV:N/AC:L/Au:N/C:P/I:P/A:P)
AFFECTED VENDORS LAquis SCADA
AFFECTED PRODUCTS Software
VULNERABILITY DETAILS


This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of LAquis SCADA Software. Authentication is not required to exploit this vulnerability.

The specific flaw exists within the processing of calls to relatorionome.lhtml. When parsing the NOME Element, the process does not properly sanitize user-supplied data, which can lead to the injection of an arbitrary script. An attacker can leverage this vulnerability to execute code in the context of the aq process.

ADDITIONAL DETAILS LAquis SCADA has issued an update to correct this vulnerability. More details can be found at:
https://ics-cert.us-cert.gov/advisories/ICSA-19-015-01
DISCLOSURE TIMELINE
  • 2018-08-14 - Vulnerability reported to vendor
  • 2019-01-19 - Coordinated public release of advisory
  • 2019-01-19 - Advisory Updated
CREDIT Esteban Ruiz (mr_me) of Source Incite
BACK TO ADVISORIES