iniNet SpiderControl SCADA Editor 6.30.01 Insecure File Permissions

2015.12.07
Risk: Medium
Local: Yes
Remote: No
CVE: N/A
CWE: N/A

iniNet SpiderControl SCADA Editor 6.30.01 Insecure File Permissions Vendor: iniNet Solutions GmbH Product web page: http://www.spidercontrol.net Affected version: 6.30.01 (Build 6300101) Summary: Modular and automated engineering is provided for HMI and SCADA. The tools are developed to join a large range of engineering modules together quickly. We modularize our software, as the mechanics of a system are modularized today. Easy to visualize with a few clicks. Desc: SpiderControl SCADA Editor suffers from an elevation of privileges vulnerability which can be used by a simple user that can change the executable file with a binary of choice. The vulnerability exist due to the improper permissions, with the 'F' flag (Full) for 'Everyone' group, and 'C' flag (Change) for 'Authenticated Users' group making the entire directory 'SCADAEditorIninet_6.30.01.01' and its files and sub-dirs world-writable. Tested on: Microsoft Windows 7 Professional SP1 (EN) Microsoft Windows 7 Ultimate SP1 (EN) Vulnerability discovered by Gjoko 'LiquidWorm' Krstic @zeroscience Advisory ID: ZSL-2015-5282 Advisory URL: http://www.zeroscience.mk/en/vulnerabilities/ZSL-2015-5282.php 22.10.2015 -- C:SpiderControlSCADAEditorIninet_6.30.01.01>cacls ScadaEditorIninet.exe C:SpiderControlSCADAEditorIninet_6.30.01.01ScadaEditorIninet.exe Everyone:(ID)F BUILTINAdministrators:(ID)F NT AUTHORITYSYSTEM:(ID)F BUILTINUsers:(ID)R NT AUTHORITYAuthenticated Users:(ID)C

References:

http://www.zeroscience.mk/en/vulnerabilities/ZSL-2015-5282.php


Vote for this issue:
50%
50%


 

Thanks for you vote!


 

Thanks for you comment!
Your message is in quarantine 48 hours.

Comment it here.


(*) - required fields.  
{{ x.nick }} | Date: {{ x.ux * 1000 | date:'yyyy-MM-dd' }} {{ x.ux * 1000 | date:'HH:mm' }} CET+1
{{ x.comment }}

Copyright 2024, cxsecurity.com

 

Back to Top