Advantech WebAccess openWidget Script Path Traversal Remote File Disclosure

This script is Copyright (C) 2016-2017 Tenable Network Security, Inc.


Synopsis :

The remote host has a web application that is affected by a file
disclosure vulnerability.

Description :

The Advantech WebAccess web server running on the remote host is
affected by a file disclosure vulnerability in the WebAccess Dashboard
Viewer due to a failure to properly sanitize user-supplied input to
the openWidget script. An unauthenticated, remote attacker can exploit
this, via path traversal, to read the content of arbitrary files on
the WebAccess server.

Note that this Advantech WebAccess web server is reportedly affected
by other vulnerabilities as well; however, Nessus has not tested for
these.

See also :

https://ics-cert.us-cert.gov/advisories/ICSA-16-014-01
http://www.zerodayinitiative.com/advisories/ZDI-16-126/

Solution :

Upgrade to Advantech WebAccess version 8.1-2015.12.30 or later.

Risk factor :

Medium / CVSS Base Score : 5.0
(CVSS2#AV:N/AC:L/Au:N/C:P/I:N/A:N)

Family: SCADA

Nessus Plugin ID: 88839 ()

Bugtraq ID: 80745

CVE ID: CVE-2016-0855

Ready to Amp Up Your Nessus Experience?

Get Nessus Professional to scan unlimited IPs, run compliance checks & more

Buy Nessus Professional Now