PT-2013-31: Cross-Site Scripting in Siemens Simatic WinCC TIA Portal Vulnerable softwareSiemens Simatic WinCC TIA Portal Version: 11.x Application link: http://www.siemens.com/Severity levelSeverity level: Medium Impact: Cross-Site Scripting Access Vector: Remote CVSS v2: Base Score: 4.0 Vector: (AV:N/AC:L/Au:S/C:N/I:P/A:N)CVE: CVE-2013-0672Software descriptionWinCC TIA Portal is part of a new, integrated engineering concept which offers a uniform engineering environment for programming and configuration of control, visualization and drive solutions.Vulnerability descriptionThe specialists of the Positive Research center have detected "Cross-Site Scripting" vulnerability in Siemens Simatic WinCC TIA Portal.The HMI’s web application is susceptible to stored Cross-Site-Scripting attacks. An authenticated user may store data on the web application, which will execute malicious JavaScript code, when other users access the affected page.How to fixUpdate your software up to the latest versionAdvisory status 21.09.2012 - Vendor gets vulnerability details 15.03.2013 - Vendor releases fixed version and details 29.03.2013 - Public disclosureCreditsThe vulnerability was discovered by Sergey Bobrov, Positive Research Center (Positive Technologies Company)Referenceshttp://en.securitylab.ru/lab/PT-2013-31 http://www.siemens.com/corporate-technology/pool/de/forschungsfelder/siemens_security_advisory_ssa-212483.pdf Reports on the vulnerabilities previously discovered by Positive Research:http://ptsecurity.com/research/advisory/ http://en.securitylab.ru/lab/