ID

VAR-201111-0308


CVE

CVE-2011-3320


TITLE

GE Intelligent Platforms Proficy Historian Vulnerable to cross-site scripting

Trust: 0.8

sources: JVNDB: JVNDB-2011-002761

DESCRIPTION

Cross-site scripting (XSS) vulnerability in the Web Administrator component in GE Intelligent Platforms Proficy Historian 4.x and earlier allows remote attackers to inject arbitrary web script or HTML via unspecified parameters. GE Proficy Historian is a factory system that collects, archives and distributes very large amounts of real-time data at high speeds, significantly improving operational visibility and profit and loss settlement lines. An attacker may leverage this issue to execute arbitrary script code in the browser of an unsuspecting user in the context of the affected site. This may let the attacker steal cookie-based authentication credentials and launch other attacks. All versions of Proficy Historian, Proficy HMI/SCADA-CIMPLICITY 8.1 and 8.2, and Proficy HMI/SCADA-iFIX 5.0 and 5.1 are vulnerable. ---------------------------------------------------------------------- Ovum says ad hoc tools are out-dated. The best practice approach? Fast vulnerability intelligence, threat handling, and setup in one tool. Read the new report on the Secunia VIM: http://secunia.com/products/corporate/vim/ovum_2011_request/ ---------------------------------------------------------------------- TITLE: Proficy Historian Cross-Site Scripting and Buffer Overflow Vulnerabilities SECUNIA ADVISORY ID: SA46699 VERIFY ADVISORY: Secunia.com http://secunia.com/advisories/46699/ Customer Area (Credentials Required) https://ca.secunia.com/?page=viewadvisory&vuln_id=46699 RELEASE DATE: 2011-11-02 DISCUSS ADVISORY: http://secunia.com/advisories/46699/#comments AVAILABLE ON SITE AND IN CUSTOMER AREA: * Last Update * Popularity * Comments * Criticality Level * Impact * Where * Solution Status * Operating System / Software * CVE Reference(s) http://secunia.com/advisories/46699/ ONLY AVAILABLE IN CUSTOMER AREA: * Authentication Level * Report Reliability * Secunia PoC * Secunia Analysis * Systems Affected * Approve Distribution * Remediation Status * Secunia CVSS Score * CVSS https://ca.secunia.com/?page=viewadvisory&vuln_id=46699 ONLY AVAILABLE WITH SECUNIA CSI AND SECUNIA PSI: * AUTOMATED SCANNING http://secunia.com/vulnerability_scanning/personal/ http://secunia.com/vulnerability_scanning/corporate/wsus_sccm_3rd_third_party_patching/ DESCRIPTION: Multiple vulnerabilities have been reported in Proficy Historian, which can be exploited by malicious people to conduct cross-site scripting attacks and compromise a vulnerable system. 2) An error in the Data Archiver service (ihDataArchiver.exe or ihDataArchiver_x64.exe) when processing certain network messages can be exploited to cause a stack-based buffer overflow via a specially crafted packet sent to TCP port 14000. Successful exploitation of this vulnerability may allow execution of arbitrary code. Please see the vendor's advisories for a list of affected versions. SOLUTION: Apply updates. PROVIDED AND/OR DISCOVERED BY: The vendor credits: 1) Billy Rios and Terry McCorkle via ICS-CERT. 2) Luigi Auriemma via ZDI. ORIGINAL ADVISORY: GE (GEIP11-01, GEIP11-03): http://support.ge-ip.com/support/resources/sites/GE_FANUC_SUPPORT/content/live/KB/14000/KB14493/en_US/GEIP11-03%20Security%20Advisory%20-%20Proficy%20Historian%20Web%20Administrator.pdf http://support.ge-ip.com/support/resources/sites/GE_FANUC_SUPPORT/content/live/KB/14000/KB14493/en_US/GEIP11-01%20Security%20Advisory%20-%20Proficy%20Historian%20ihDataArchiver.pdf OTHER REFERENCES: Further details available in Customer Area: http://secunia.com/vulnerability_intelligence/ DEEP LINKS: Further details available in Customer Area: http://secunia.com/vulnerability_intelligence/ EXTENDED DESCRIPTION: Further details available in Customer Area: http://secunia.com/vulnerability_intelligence/ EXTENDED SOLUTION: Further details available in Customer Area: http://secunia.com/vulnerability_intelligence/ EXPLOIT: Further details available in Customer Area: http://secunia.com/vulnerability_intelligence/ ---------------------------------------------------------------------- About: This Advisory was delivered by Secunia as a free service to help private users keeping their systems up to date against the latest vulnerabilities. Subscribe: http://secunia.com/advisories/secunia_security_advisories/ Definitions: (Criticality, Where etc.) http://secunia.com/advisories/about_secunia_advisories/ Please Note: Secunia recommends that you verify all advisories you receive by clicking the link. Secunia NEVER sends attached files with advisories. Secunia does not advise people to install third party patches, only use those supplied by the vendor. ---------------------------------------------------------------------- Unsubscribe: Secunia Security Advisories http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org ----------------------------------------------------------------------

Trust: 2.7

sources: NVD: CVE-2011-3320 // JVNDB: JVNDB-2011-002761 // CNVD: CNVD-2011-4652 // BID: 50473 // IVD: 6ff6fb98-2354-11e6-abef-000c29c66e3d // PACKETSTORM: 106515

IOT TAXONOMY

category:['ICS']sub_category: -

Trust: 0.8

sources: IVD: 6ff6fb98-2354-11e6-abef-000c29c66e3d // CNVD: CNVD-2011-4652

AFFECTED PRODUCTS

vendor:gemodel:intelligent platforms proficy historianscope:eqversion:3.1

Trust: 1.6

vendor:gemodel:intelligent platforms proficy historianscope:eqversion:3.5

Trust: 1.6

vendor:gemodel:intelligent platforms proficy historianscope:lteversion:4.0

Trust: 1.0

vendor:general electricmodel:proficy historianscope:lteversion:4.x

Trust: 0.8

vendor:general electricmodel:proficy historianscope:eqversion:3.5

Trust: 0.6

vendor:general electricmodel:proficy historianscope:lteversion:<=4.4.1

Trust: 0.6

vendor:general electricmodel:proficy historianscope:eqversion:4.0

Trust: 0.6

vendor:gemodel:intelligent platforms proficy historianscope:eqversion:4.0

Trust: 0.6

vendor:generalmodel:electric proficy hmi/scada-ifixscope:eqversion:5.1

Trust: 0.3

vendor:generalmodel:electric proficy hmi/scada-ifixscope:eqversion:5.0

Trust: 0.3

vendor:generalmodel:electric proficy hmi/scada-cimplicityscope:eqversion:8.2

Trust: 0.3

vendor:generalmodel:electric proficy hmi/scada-cimplicityscope:eqversion:8.1

Trust: 0.3

vendor:generalmodel:electric proficy historianscope:eqversion:0

Trust: 0.3

vendor:intelligent platforms proficy historianmodel: - scope:eqversion:3.1

Trust: 0.2

vendor:intelligent platforms proficy historianmodel: - scope:eqversion:3.5

Trust: 0.2

vendor:intelligent platforms proficy historianmodel: - scope:eqversion:*

Trust: 0.2

sources: IVD: 6ff6fb98-2354-11e6-abef-000c29c66e3d // CNVD: CNVD-2011-4652 // BID: 50473 // JVNDB: JVNDB-2011-002761 // CNNVD: CNNVD-201111-052 // NVD: CVE-2011-3320

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2011-3320
value: MEDIUM

Trust: 1.0

NVD: CVE-2011-3320
value: MEDIUM

Trust: 0.8

CNNVD: CNNVD-201111-052
value: MEDIUM

Trust: 0.6

IVD: 6ff6fb98-2354-11e6-abef-000c29c66e3d
value: MEDIUM

Trust: 0.2

nvd@nist.gov: CVE-2011-3320
severity: MEDIUM
baseScore: 4.3
vectorString: AV:N/AC:M/AU:N/C:N/I:P/A:N
accessVector: NETWORK
accessComplexity: MEDIUM
authentication: NONE
confidentialityImpact: NONE
integrityImpact: PARTIAL
availabilityImpact: NONE
exploitabilityScore: 8.6
impactScore: 2.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.8

IVD: 6ff6fb98-2354-11e6-abef-000c29c66e3d
severity: MEDIUM
baseScore: 4.3
vectorString: AV:N/AC:M/AU:N/C:N/I:P/A:N
accessVector: NETWORK
accessComplexity: MEDIUM
authentication: NONE
confidentialityImpact: NONE
integrityImpact: PARTIAL
availabilityImpact: NONE
exploitabilityScore: 8.6
impactScore: 2.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.9 [IVD]

Trust: 0.2

sources: IVD: 6ff6fb98-2354-11e6-abef-000c29c66e3d // JVNDB: JVNDB-2011-002761 // CNNVD: CNNVD-201111-052 // NVD: CVE-2011-3320

PROBLEMTYPE DATA

problemtype:CWE-79

Trust: 1.8

sources: JVNDB: JVNDB-2011-002761 // NVD: CVE-2011-3320

THREAT TYPE

remote

Trust: 0.6

sources: CNNVD: CNNVD-201111-052

TYPE

xss

Trust: 0.7

sources: PACKETSTORM: 106515 // CNNVD: CNNVD-201111-052

CONFIGURATIONS

sources: JVNDB: JVNDB-2011-002761

PATCH

title:Top Pageurl:http://www.ge-ip.com/

Trust: 0.8

title:partnerurl:http://www.ge-ip.co.jp/partner.html

Trust: 0.8

title:Top Pageurl:http://www.ge-ip.co.jp/

Trust: 0.8

title:GE Proficy Historian Web Management Patch for Cross-Site Scripting Vulnerabilitiesurl:https://www.cnvd.org.cn/patchInfo/show/5763

Trust: 0.6

sources: CNVD: CNVD-2011-4652 // JVNDB: JVNDB-2011-002761

EXTERNAL IDS

db:NVDid:CVE-2011-3320

Trust: 3.5

db:ICS CERTid:ICSA-11-243-02

Trust: 3.3

db:BIDid:50473

Trust: 1.9

db:CNVDid:CNVD-2011-4652

Trust: 0.8

db:CNNVDid:CNNVD-201111-052

Trust: 0.8

db:JVNDBid:JVNDB-2011-002761

Trust: 0.8

db:SECUNIAid:46699

Trust: 0.7

db:IVDid:6FF6FB98-2354-11E6-ABEF-000C29C66E3D

Trust: 0.2

db:PACKETSTORMid:106515

Trust: 0.1

sources: IVD: 6ff6fb98-2354-11e6-abef-000c29c66e3d // CNVD: CNVD-2011-4652 // BID: 50473 // JVNDB: JVNDB-2011-002761 // PACKETSTORM: 106515 // CNNVD: CNNVD-201111-052 // NVD: CVE-2011-3320

REFERENCES

url:http://www.us-cert.gov/control_systems/pdf/icsa-11-243-02.pdf

Trust: 3.3

url:http://www.securityfocus.com/bid/50473

Trust: 1.6

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2011-3320

Trust: 0.8

url:http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2011-3320

Trust: 0.8

url:http://secunia.com/advisories/46699

Trust: 0.6

url:http://support.ge-ip.com/support/resources/sites/ge_fanuc_support/content/live/kb/14000/kb14493/en_us/geip11-03%20security%20advisory%20-%20proficy%20historian%20web%20administrator.pdf

Trust: 0.4

url:http://www.ge-ip.com/products/2420

Trust: 0.3

url:http://secunia.com/advisories/46699/#comments

Trust: 0.1

url:https://ca.secunia.com/?page=viewadvisory&vuln_id=46699

Trust: 0.1

url:http://secunia.com/vulnerability_intelligence/

Trust: 0.1

url:http://secunia.com/advisories/secunia_security_advisories/

Trust: 0.1

url:http://secunia.com/vulnerability_scanning/corporate/wsus_sccm_3rd_third_party_patching/

Trust: 0.1

url:http://support.ge-ip.com/support/resources/sites/ge_fanuc_support/content/live/kb/14000/kb14493/en_us/geip11-01%20security%20advisory%20-%20proficy%20historian%20ihdataarchiver.pdf

Trust: 0.1

url:http://secunia.com/advisories/46699/

Trust: 0.1

url:http://secunia.com/vulnerability_scanning/personal/

Trust: 0.1

url:http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org

Trust: 0.1

url:http://secunia.com/products/corporate/vim/ovum_2011_request/

Trust: 0.1

url:http://secunia.com/advisories/about_secunia_advisories/

Trust: 0.1

sources: CNVD: CNVD-2011-4652 // BID: 50473 // JVNDB: JVNDB-2011-002761 // PACKETSTORM: 106515 // CNNVD: CNNVD-201111-052 // NVD: CVE-2011-3320

CREDITS

Billy Rios and Terry McCorkle

Trust: 0.9

sources: BID: 50473 // CNNVD: CNNVD-201111-052

SOURCES

db:IVDid:6ff6fb98-2354-11e6-abef-000c29c66e3d
db:CNVDid:CNVD-2011-4652
db:BIDid:50473
db:JVNDBid:JVNDB-2011-002761
db:PACKETSTORMid:106515
db:CNNVDid:CNNVD-201111-052
db:NVDid:CVE-2011-3320

LAST UPDATE DATE

2024-08-14T14:21:35.374000+00:00


SOURCES UPDATE DATE

db:CNVDid:CNVD-2011-4652date:2011-11-03T00:00:00
db:BIDid:50473date:2015-03-19T08:47:00
db:JVNDBid:JVNDB-2011-002761date:2012-02-03T00:00:00
db:CNNVDid:CNNVD-201111-052date:2011-11-03T00:00:00
db:NVDid:CVE-2011-3320date:2011-11-17T05:00:00

SOURCES RELEASE DATE

db:IVDid:6ff6fb98-2354-11e6-abef-000c29c66e3ddate:2011-11-03T00:00:00
db:CNVDid:CNVD-2011-4652date:2011-11-03T00:00:00
db:BIDid:50473date:2011-11-01T00:00:00
db:JVNDBid:JVNDB-2011-002761date:2011-11-09T00:00:00
db:PACKETSTORMid:106515date:2011-11-02T02:34:47
db:CNNVDid:CNNVD-201111-052date:1900-01-01T00:00:00
db:NVDid:CVE-2011-3320date:2011-11-02T17:55:01.090