AVEVA Software, LLC InduSoft Web Studio prior to Version 8.1 SP3 and InTouch Edge HMI (formerly InTouch Machine Edition) prior to Version 2017 Update. An unauthenticated remote user could use a specially crafted database connection configuration file to execute an arbitrary process on the server machine.
The product receives input from an upstream component, but it does not restrict or incorrectly restricts the input before it is used as an identifier for a resource that may be outside the intended sphere of control.
Link | Tags |
---|---|
https://ics-cert.us-cert.gov/advisories/ICSA-19-036-01 | mitigation third party advisory us government resource |
https://www.exploit-db.com/exploits/46342/ | third party advisory vdb entry exploit |
https://www.tenable.com/security/research/tra-2019-04 | third party advisory |