The XPath functionality in unspecified web applications in Siemens WinCC 7.0 SP3 before Update 2 does not properly handle special characters in parameters, which allows remote authenticated users to read or modify settings via a crafted URL, related to an "XML injection" attack.
References
Link | Resource |
---|---|
http://www.siemens.com/corporate-technology/pool/de/forschungsfelder/siemens_security_advisory_ssa-223158.pdf | Vendor Advisory |
http://www.us-cert.gov/control_systems/pdf/ICSA-12-158-01.pdf | US Government Resource |
http://www.siemens.com/corporate-technology/pool/de/forschungsfelder/siemens_security_advisory_ssa-223158.pdf | Vendor Advisory |
http://www.us-cert.gov/control_systems/pdf/ICSA-12-158-01.pdf | US Government Resource |
Configurations
Configuration 1 (hide)
|
History
21 Nov 2024, 01:39
Type | Values Removed | Values Added |
---|---|---|
References | () http://www.siemens.com/corporate-technology/pool/de/forschungsfelder/siemens_security_advisory_ssa-223158.pdf - Vendor Advisory | |
References | () http://www.us-cert.gov/control_systems/pdf/ICSA-12-158-01.pdf - US Government Resource |
Information
Published : 2012-06-08 18:55
Updated : 2024-11-21 01:39
NVD link : CVE-2012-2596
Mitre link : CVE-2012-2596
CVE.ORG link : CVE-2012-2596
JSON object : View
Products Affected
siemens
- wincc
CWE
CWE-94
Improper Control of Generation of Code ('Code Injection')