CVE-2014-5398
Published Aug 28, 2014
Last updated 10 years ago
Overview
- Description
- Schneider Electric Wonderware Information Server (WIS) Portal 4.0 SP1 through 5.5 allows remote attackers to read arbitrary files or cause a denial of service via an XML external entity declaration in conjunction with an entity reference, related to an XML External Entity (XXE) issue.
- Source
- ics-cert@hq.dhs.gov
- NVD status
- Analyzed
Social media
- Hype score
- Not currently trending
Risk scores
CVSS 2.0
- Type
- Primary
- Base score
- 2.1
- Impact score
- 2.9
- Exploitability score
- 3.9
- Vector string
- AV:L/AC:L/Au:N/C:P/I:N/A:N
Weaknesses
- nvd@nist.gov
- CWE-20
Evaluator
- Comment
- -
- Impact
- Per: https://ics-cert.us-cert.gov/advisories/ICSA-14-238-02 "WIS may allow access to local resources (files and internal resources) via unsafe parsing of XML external entities. By using specially crafted XML files, an attacker can cause these products to send the contents of local remote resources to the attacker’s server or cause a denial of service of the system. This vulnerability is not exploitable remotely and cannot be exploited without user interaction. The exploit is only triggered when a local user runs the vulnerable application and loads the malformed XML files."
- Solution
- Per: https://ics-cert.us-cert.gov/advisories/ICSA-14-238-02 "WIS may allow access to local resources (files and internal resources) via unsafe parsing of XML external entities. By using specially crafted XML files, an attacker can cause these products to send the contents of local remote resources to the attacker’s server or cause a denial of service of the system. This vulnerability is not exploitable remotely and cannot be exploited without user interaction. The exploit is only triggered when a local user runs the vulnerable application and loads the malformed XML files."
Configurations
[ { "nodes": [ { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:a:invensys:wonderware_information_server:4.0:sp1:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "325DE4D6-7649-4566-BC6E-1F8DC16FF1A9" }, { "criteria": "cpe:2.3:a:invensys:wonderware_information_server:4.0:sp1:*:*:portal:*:*:*", "vulnerable": true, "matchCriteriaId": "C8A82967-0AEC-4C46-91D0-92CA332C9C86" }, { "criteria": "cpe:2.3:a:invensys:wonderware_information_server:4.5:-:portal:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "D7292C59-D289-4874-8385-B1B2C246F935" }, { "criteria": "cpe:2.3:a:invensys:wonderware_information_server:5.0:-:portal:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "8EA37129-F327-4EE6-B1FB-BFB0C3C68856" }, { "criteria": "cpe:2.3:a:invensys:wonderware_information_server:5.5:*:*:*:portal:*:*:*", "vulnerable": true, "matchCriteriaId": "FFBE9EBE-6678-4AFC-9052-8EC6B319EB7B" } ], "operator": "OR" } ] } ]