Advisory Details

June 30th, 2020

ICONICS Genesis64 TestQuery SQL Injection Remote Code Execution Vulnerability

ZDI-20-779
ZDI-CAN-10288

CVE ID CVE-2020-12013
CVSS SCORE 9.8, AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
AFFECTED VENDORS ICONICS
AFFECTED PRODUCTS Genesis64
VULNERABILITY DETAILS

The vulnerablity allows remote attackers to execute arbitrary code on affected installations of ICONICS Genesis64. Authentication is not required to exploit this vulnerability.

The specific flaw exists within the processing of requests to the TestQuery endpoint of the IcoFwxServer service. The issue results from the lack of proper validation of a user-supplied string before using it to construct SQL queries. An attacker can leverage this vulnerability to execute code in the context of the current process.

ADDITIONAL DETAILS ICONICS has issued an update to correct this vulnerability. More details can be found at:
https://www.us-cert.gov/ics/advisories/icsa-20-170-03
DISCLOSURE TIMELINE
  • 2020-06-23 - Vulnerability reported to vendor
  • 2020-06-30 - Coordinated public release of advisory
CREDIT Ben McBride
BACK TO ADVISORIES