- Description
- Schneider Electric Wonderware Information Server (WIS) Portal 4.0 SP1 through 5.5 allows remote attackers to read arbitrary files or cause a denial of service via an XML external entity declaration in conjunction with an entity reference, related to an XML External Entity (XXE) issue.
- Source
- ics-cert@hq.dhs.gov
- NVD status
- Modified
CVSS 2.0
- Type
- Primary
- Base score
- 2.1
- Impact score
- 2.9
- Exploitability score
- 3.9
- Vector string
- AV:L/AC:L/Au:N/C:P/I:N/A:N
- nvd@nist.gov
- CWE-20
- Hype score
- Not currently trending
- Comment
- -
- Impact
- Per: https://ics-cert.us-cert.gov/advisories/ICSA-14-238-02 "WIS may allow access to local resources (files and internal resources) via unsafe parsing of XML external entities. By using specially crafted XML files, an attacker can cause these products to send the contents of local remote resources to the attacker’s server or cause a denial of service of the system. This vulnerability is not exploitable remotely and cannot be exploited without user interaction. The exploit is only triggered when a local user runs the vulnerable application and loads the malformed XML files."
- Solution
- Per: https://ics-cert.us-cert.gov/advisories/ICSA-14-238-02 "WIS may allow access to local resources (files and internal resources) via unsafe parsing of XML external entities. By using specially crafted XML files, an attacker can cause these products to send the contents of local remote resources to the attacker’s server or cause a denial of service of the system. This vulnerability is not exploitable remotely and cannot be exploited without user interaction. The exploit is only triggered when a local user runs the vulnerable application and loads the malformed XML files."
[
{
"nodes": [
{
"negate": false,
"cpeMatch": [
{
"criteria": "cpe:2.3:a:invensys:wonderware_information_server:4.0:sp1:*:*:*:*:*:*",
"vulnerable": true,
"matchCriteriaId": "325DE4D6-7649-4566-BC6E-1F8DC16FF1A9"
},
{
"criteria": "cpe:2.3:a:invensys:wonderware_information_server:4.0:sp1:*:*:portal:*:*:*",
"vulnerable": true,
"matchCriteriaId": "C8A82967-0AEC-4C46-91D0-92CA332C9C86"
},
{
"criteria": "cpe:2.3:a:invensys:wonderware_information_server:4.5:-:portal:*:*:*:*:*",
"vulnerable": true,
"matchCriteriaId": "D7292C59-D289-4874-8385-B1B2C246F935"
},
{
"criteria": "cpe:2.3:a:invensys:wonderware_information_server:5.0:-:portal:*:*:*:*:*",
"vulnerable": true,
"matchCriteriaId": "8EA37129-F327-4EE6-B1FB-BFB0C3C68856"
},
{
"criteria": "cpe:2.3:a:invensys:wonderware_information_server:5.5:*:*:*:portal:*:*:*",
"vulnerable": true,
"matchCriteriaId": "FFBE9EBE-6678-4AFC-9052-8EC6B319EB7B"
}
],
"operator": "OR"
}
]
}
]