The XPath functionality in unspecified web applications in Siemens WinCC 7.0 SP3 before Update 2 does not properly handle special characters in parameters, which allows remote authenticated users to read or modify settings via a crafted URL, related to an "XML injection" attack.
References
Link | Resource |
---|---|
http://www.siemens.com/corporate-technology/pool/de/forschungsfelder/siemens_security_advisory_ssa-223158.pdf | Vendor Advisory |
http://www.us-cert.gov/control_systems/pdf/ICSA-12-158-01.pdf | US Government Resource |
Configurations
Configuration 1 (hide)
|
Information
Published : 2012-06-08 11:55
Updated : 2012-06-11 21:00
NVD link : CVE-2012-2596
Mitre link : CVE-2012-2596
JSON object : View
CWE
CWE-94
Improper Control of Generation of Code ('Code Injection')
Products Affected
siemens
- wincc