Wieland wieplan 4.1 Document Parsing Java Code Execution Using XMLDecoder
Title: Wieland wieplan 4.1 Document Parsing Java Code Execution Using XMLDecoder
Advisory ID: ZSL-2016-5304
Type: Local/Remote
Impact: System Access
Risk: (5/5)
Release Date: 10.02.2016
Microsoft Windows 7 Ultimate SP1 (EN)
Java/1.8.0_73
Java/1.6.0_62
[08.12.2015] Vendor contacted.
[09.02.2016] No response from the vendor.
[10.02.2016] Public security advisory released.
[2] https://cxsecurity.com/issue/WLB-2016020106
[3] https://packetstormsecurity.com/files/135723
[4] https://exchange.xforce.ibmcloud.com/vulnerabilities/110809
[12.02.2016] - Added reference [2] and [3]
[01.04.2016] - Added reference [4]
Web: http://www.zeroscience.mk
e-mail: lab@zeroscience.mk
Advisory ID: ZSL-2016-5304
Type: Local/Remote
Impact: System Access
Risk: (5/5)
Release Date: 10.02.2016
Summary
Your new software for the configuration of Wieland terminal rails. wieplan enables you to plan a complete terminal rail in a very simple way and to then place an order with Wieland. The configured terminal rail can be stored in DXF format and read into a CAD tool for further processing. Due to the intuitive user interface, the configuration of terminal rails with wieplan is easy.Description
wieplan suffers from an arbitrary java code execution when parsing WIE documents that uses XMLDecoder, allowing system access to the affected machine. The software is used to generate custom specification order saved in .wie XML file that has to be sent to the vendor offices to be processed.Vendor
Wieland Electric GmbH - http://www.wieland-electric.comAffected Version
4.1 (Build 9)Tested On
Microsoft Windows 7 Professional SP1 (EN)Microsoft Windows 7 Ultimate SP1 (EN)
Java/1.8.0_73
Java/1.6.0_62
Vendor Status
[25.11.2015] Vulnerability discovered.[08.12.2015] Vendor contacted.
[09.02.2016] No response from the vendor.
[10.02.2016] Public security advisory released.
PoC
wieplan_javaexec.txtCredits
Vulnerability discovered by Gjoko Krstic - <gjoko@zeroscience.mk>References
[1] https://www.exploit-db.com/exploits/39438/[2] https://cxsecurity.com/issue/WLB-2016020106
[3] https://packetstormsecurity.com/files/135723
[4] https://exchange.xforce.ibmcloud.com/vulnerabilities/110809
Changelog
[10.02.2016] - Initial release[12.02.2016] - Added reference [2] and [3]
[01.04.2016] - Added reference [4]
Contact
Zero Science LabWeb: http://www.zeroscience.mk
e-mail: lab@zeroscience.mk