SB2023080325 - Multiple vulnerabilities in Inductive Automation Ignition
Published: August 3, 2023
Breakdown by Severity
- Low
- Medium
- High
- Critical
Description
This security bulletin contains information about 4 secuirty vulnerabilities.
1) Exposed dangerous method or function (CVE-ID: CVE-2023-38124)
The vulnerability allows a remote user to execute arbitrary code on the target system.
The vulnerability exists due to the exposure of a dangerous function. A remote administrator can execute arbitrary code on the target system.
Successful exploitation of this vulnerability may result in complete compromise of vulnerable system.
2) Cross-site scripting (CVE-ID: CVE-2023-38121)
The disclosed vulnerability allows a remote attacker to perform cross-site scripting (XSS) attacks.
The vulnerability exists due to insufficient sanitization of user-supplied data in the id parameter. A remote attacker can trick the victim to follow a specially crafted link and execute arbitrary HTML and script code in user's browser in context of vulnerable website.
Successful exploitation of this vulnerability may allow a remote attacker to steal potentially sensitive information, change appearance of the web page, perform phishing and drive-by-download attacks.
3) Improper Authentication (CVE-ID: CVE-2023-38122)
The vulnerability allows a remote user to bypass authentication process.
The vulnerability exists due to the lack of appropriate Content Security Policy headers. A remote administrator can bypass authentication mechanism and execute arbitrary code.
4) Missing Authentication for Critical Function (CVE-ID: CVE-2023-38123)
The vulnerability allows a remote attacker to bypass authentication process.
The vulnerability exists due to the lack of authentication prior to allowing access to password change functionality. A remote attacker can trick a victim to open a speciall crafted file bypass authentication process on the system.
Remediation
Install update from vendor's website.
References
- https://www.zerodayinitiative.com/advisories/ZDI-23-1015/
- https://inductiveautomation.com/blog/inductive-automation-participates-in-pwn2own-to-strengthen-ignition-security
- https://www.zerodayinitiative.com/advisories/ZDI-23-1012/
- https://www.zerodayinitiative.com/advisories/ZDI-23-1013/
- https://www.zerodayinitiative.com/advisories/ZDI-23-1014/