PT-2012-42: Multiple Cross Site Scripting and Cross Site Request Forgery vulnerabilities in Siemens Simatic WinCC WebNavigator Vulnerable softwareSiemens Simatic WinCC WebNavigator Version: 7.0 SP3 and earlierApplication link: http://www.siemens.com/Vulnerabilities descriptionThe specialists of the Positive Research center have revealed a multiple Cross Site Scripting and Cross Site Request Forgery vulnerabilities in Siemens Simatic WinCC WebNavigator.CVSS v2: Base Score: 8.3 Vector: (AV:N/AC:M/Au:N/C:P/I:P/A:C)CVE: CVE-2012-3031Reflected Cross Site Scripting was found in POST parameters, GET parameters and referrers. If this attack is successful, the attacker can take over the WebNavigator session with the victim’s rights.CVSS v2: Base Score: 7.8 Vector: (AV:N/AC:M/Au:N/C:N/I:P/A:C)CVE: CVE-2012-3028Cross Site Request Forgery is related to the Cross Site Scripting vulnerability and works in a similar way: If a victim clicks on a malicious link, actions can be triggered in the browser, where WebNavigator is running.How to fixUpdate your software up to the latest versionAdvisory status16.07.2012 - Vendor is notified 16.07.2012 - Vendor gets vulnerability details 10.09.2012 - Vendor releases fixed version and details 13.09.2012 - Public disclosureCreditsThe vulnerabilities was discovered by Sergey Bobrov, Timur Yunusov, Artem Chaykin, Pavel Toporkov, Vladimir Kochetkov, Positive Research Center (Positive Technologies Company)Referenceshttp://en.securitylab.ru/lab/PT-2012-42 http://www.siemens.com/corporate-technology/pool/de/forschungsfelder/siemens_security_advisory_ssa-864051.pdf Reports on the vulnerabilities previously discovered by Positive Research:http://ptsecurity.com/research/advisory/ http://en.securitylab.ru/lab/