what you don't know can hurt you
Home Files News &[SERVICES_TAB]About Contact Add New

proficy-upload.txt

proficy-upload.txt
Posted Jan 26, 2008
Authored by Eyal Udassin | Site c4-security.com

Proficy Information Portal version 2.6 has a flaw that allows an authenticated attacker the ability to upload arbitrary code on the server.

tags | advisory, arbitrary, file upload
advisories | CVE-2008-0175
SHA-256 | 8fe8e4b4c25860812b02f54a0cb017e1b4fc3b6c4390039ca199adb32e1f2f6b

proficy-upload.txt

Change Mirror Download
Background
-----------------
GE-Fanuc's Proficy Information Portal 2.6 is a web based reporting
application for the SCADA environment. As such it will usually be installed
in a buffer zone between the SCADA and the corporate network, which makes it
a very sensitive application as it can reach both networks.

Description
----------------
Any authenticated user can use the "Add WebSource" option to upload any file
(including asp) to the server, to the main virtual directory where it can be
launched by simply requesting it with a web browser. This vulnerability
exists due to a faulty Java RMI call which is associated with the "Add
WebSource" which allows the user to set the name and path of where the file
should be placed, and another parameter is a base64 encoded content for the
file itself.

Impact
----------
An authenticated attacker can compromise the server running Proficy
Information Portal, enabling him to progress to the control/process network.

Affected Versions
-------------------------
Proficy Information Portal 2.6
Previous versions may be vulnerable, as they were not tested.

Workaround/Fix
-----------------------
Vendor fix will be available by Feb 15th.
A possible workaround is to remove the write permission of the IIS user from
the Proficy directory.

Additional Information
-------------------------------
For additional information please contact us at info@c4-security.com. Note
that we will respond only to verified utility personnel and governmental
agencies.
The CVE identifier assigned to this vulnerability by CERT is CVE-2008-0175

Credit
--------
This vulnerability was discovered and exploited by Eyal Udassin of C4.

Regards,

Eyal Udassin - C4 (Formerly Swift Coders)
33 Jabotinsky St. The Twin Towers #1, Ramat Gan, Israel
eyal.udassin@c4-security.com / www.c4-security.com
<http://www.c4-security.com/>
+972-547-684989
Login or Register to add favorites

File Archive:

August 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Aug 1st
    15 Files
  • 2
    Aug 2nd
    22 Files
  • 3
    Aug 3rd
    0 Files
  • 4
    Aug 4th
    0 Files
  • 5
    Aug 5th
    15 Files
  • 6
    Aug 6th
    11 Files
  • 7
    Aug 7th
    43 Files
  • 8
    Aug 8th
    42 Files
  • 9
    Aug 9th
    36 Files
  • 10
    Aug 10th
    0 Files
  • 11
    Aug 11th
    0 Files
  • 12
    Aug 12th
    27 Files
  • 13
    Aug 13th
    18 Files
  • 14
    Aug 14th
    0 Files
  • 15
    Aug 15th
    0 Files
  • 16
    Aug 16th
    0 Files
  • 17
    Aug 17th
    0 Files
  • 18
    Aug 18th
    0 Files
  • 19
    Aug 19th
    0 Files
  • 20
    Aug 20th
    0 Files
  • 21
    Aug 21st
    0 Files
  • 22
    Aug 22nd
    0 Files
  • 23
    Aug 23rd
    0 Files
  • 24
    Aug 24th
    0 Files
  • 25
    Aug 25th
    0 Files
  • 26
    Aug 26th
    0 Files
  • 27
    Aug 27th
    0 Files
  • 28
    Aug 28th
    0 Files
  • 29
    Aug 29th
    0 Files
  • 30
    Aug 30th
    0 Files
  • 31
    Aug 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close