iniNet SpiderControl SCADA Editor version 6.30.01 suffers from an insecure file permission vulnerability that can lead to privilege escalation.
f5a8eaf90b14310aa70398ca3cf3b63f72ec34a45eb723175e016bf2de427b31
iniNet SpiderControl SCADA Editor 6.30.01 Insecure File Permissions
Vendor: iniNet Solutions GmbH
Product web page: http://www.spidercontrol.net
Affected version: 6.30.01 (Build 6300101)
Summary: Modular and automated engineering is provided for HMI and
SCADA. The tools are developed to join a large range of engineering
modules together quickly. We modularize our software, as the mechanics
of a system are modularized today. Easy to visualize with a few clicks.
Desc: SpiderControl SCADA Editor suffers from an elevation of privileges
vulnerability which can be used by a simple user that can change the
executable file with a binary of choice. The vulnerability exist due to
the improper permissions, with the 'F' flag (Full) for 'Everyone' group,
and 'C' flag (Change) for 'Authenticated Users' group making the entire
directory 'SCADAEditorIninet_6.30.01.01' and its files and sub-dirs
world-writable.
Tested on: Microsoft Windows 7 Professional SP1 (EN)
Microsoft Windows 7 Ultimate SP1 (EN)
Vulnerability discovered by Gjoko 'LiquidWorm' Krstic
@zeroscience
Advisory ID: ZSL-2015-5282
Advisory URL: http://www.zeroscience.mk/en/vulnerabilities/ZSL-2015-5282.php
22.10.2015
--
C:\SpiderControl\SCADAEditorIninet_6.30.01.01>cacls ScadaEditorIninet.exe
C:\SpiderControl\SCADAEditorIninet_6.30.01.01\ScadaEditorIninet.exe Everyone:(ID)F
BUILTIN\Administrators:(ID)F
NT AUTHORITY\SYSTEM:(ID)F
BUILTIN\Users:(ID)R
NT AUTHORITY\Authenticated Users:(ID)C