{"vuid":"VU#339345","idnumber":"339345","name":"GE Fanuc Proficy Information Portal allows arbitrary file upload and execution","keywords":["scada","historian","asp shell","upload"],"overview":"GE Fanuc Proficy Information Portal allows authenticated users to upload arbitrary files. An attacker could upload an executable server-side script (e.g., an .asp shell on a Microsoft Internet Information Server platform) and execute arbitrary commands with the privileges of the web server.","clean_desc":"GE Fanuc Proficy Information Portal is a web-based systems reporting tool often used to consolidate and integrate online and process-based systems data between Supervisory Control And Data Acquisition (SCADA) systems and the corporate network. Proficy Information Portal supports an \"Add WebSource\" feature that allows authenticated users to upload arbitrary files to the server. An uploaded file can subsequently be executed by requesting it with a web browser. This vulnerability affects GE Fanuc Proficy Information Portal up to and including version 2.6. Exploit code for this vulnerability is publicly available.","impact":"By uploading a file that can be executed by the web server (e.g., an .asp shell), a remote, authenticated attacker may be able to execute arbitrary code. The attacker could exploit this behavior to access SCADA networks.","resolution":"Patch\nThis vulnerability will be  addressed with a Software Improvement Module (SIM) for PROFICY 2.6. For more information about the availability of this SIM, Proficy customers should refer to GE Fanuc knowledge base article KB12460. Upgrade Users of affected software with versions older than 2.6 are encouraged to upgrade to 2.6 or greater and then apply the patches described above. For more information, Proficy customers should refer to GE Fanuc knowledge base article KB12460.","workarounds":"Restrict Access Limit network access to hosts that require connections to the portal. Do not allow access to the portal from untrusted networks such as the internet. Filter URLs Using a reverse HTTP proxy, web server URL filtering, or similar technology, it may be possible to restrict the names and extensions of files that can be uploaded to the Proficy Information Portal. Modify Web Server Permissions It may be possible to modify web server permissions to prevent file uploads. This may impact portal functionality.","sysaffected":"","thanks":"This vulnerability was reported by Eyal Udassin of \nC4 Security","author":"This document was written by Chris Taschner.","public":["http://www.securityfocus.com/archive/1/487079/30/0/threaded","http://support.gefanuc.com/support/index?page=kbchannel&id=KB12460","http://packetstormsecurity.org/0811-exploits/hooked_on_fanucs.rb.txt"],"cveids":["CVE-2008-0175"],"certadvisory":"","uscerttechnicalalert":null,"datecreated":"2007-10-22T15:04:03Z","publicdate":"2008-01-24T00:00:00Z","datefirstpublished":"2008-01-25T20:32:46Z","dateupdated":"2008-12-18T17:06:13Z","revision":45,"vrda_d1_directreport":"1","vrda_d1_population":"1","vrda_d1_impact":"3","cam_widelyknown":"1","cam_exploitation":"0","cam_internetinfrastructure":"3","cam_population":"4","cam_impact":"14","cam_easeofexploitation":"20","cam_attackeraccessrequired":"10","cam_scorecurrent":"0.84","cam_scorecurrentwidelyknown":"4.83","cam_scorecurrentwidelyknownexploited":"9.03","ipprotocol":"tcp","cvss_accessvector":"","cvss_accesscomplexity":"","cvss_authentication":null,"cvss_confidentialityimpact":"","cvss_integrityimpact":"","cvss_availabilityimpact":"","cvss_exploitablity":null,"cvss_remediationlevel":"","cvss_reportconfidence":"","cvss_collateraldamagepotential":"","cvss_targetdistribution":"","cvss_securityrequirementscr":"","cvss_securityrequirementsir":"","cvss_securityrequirementsar":"","cvss_basescore":"","cvss_basevector":"","cvss_temporalscore":"","cvss_environmentalscore":"","cvss_environmentalvector":"","metric":0.84,"vulnote":null}