Home    |    View Topics    |    Search    |    Contact Us    |   



Category:   Application (Generic)  >   Proficy Vendors:   General Electric Company
Proficy Real-Time Information Portal Lets Remote Authenticated Users Upload Arbitrary Files and Execute Arbitrary Code on the Target System
SecurityTracker Alert ID:  1019274
SecurityTracker URL:
CVE Reference:   CVE-2008-0175   (Links to External Site)
Date:  Jan 26 2008
Impact:   Execution of arbitrary code via network, Modification of user information, User access via network
Vendor Confirmed:  Yes  
Version(s): 2.6, possibly prior versions
Description:   A vulnerability was reported in Proficy Real-Time Information Portal. A remote authentication user can upload arbitrary files and execute arbitrary code on the target system.

A remote authenticated user can invoke a Java RMI call as part of the 'Add WebSource' function to upload arbitrary files to main virtual directory on the target system. The user can then cause the web server to execute the file. The code will run with the privileges of the web service.

Eyal Udassin of C4 reported this vulnerability.

Impact:   A remote authentication user can upload arbitrary files and execute arbitrary code on the target system.
Solution:   No solution was available at the time of this entry.

The vendor plans to issue a Software Improvement Module by February 15, 2008.

The GE advisory is available at:

Vendor URL: (Links to External Site)
Cause:   Access control error

Message History:   None.

 Source Message Contents

Subject:  C4 Security Advisory - GE Fanuc Proficy Information Portal 2.6 Arbitrary File Upload and Execution

GE-Fanuc's Proficy Information Portal 2.6 is a web based reporting
application for the SCADA environment. As such it will usually be installed
in a buffer zone between the SCADA and the corporate network, which makes it
a very sensitive application as it can reach both networks.
Any authenticated user can use the "Add WebSource" option to upload any file
(including asp) to the server, to the main virtual directory where it can be
launched by simply requesting it with a web browser. This vulnerability
exists due to a faulty Java RMI call which is associated with the "Add
WebSource" which allows the user to set the name and path of where the file
should be placed, and another parameter is a base64 encoded content for the
file itself.

An authenticated attacker can compromise the server running Proficy
Information Portal, enabling him to progress to the control/process network.
Affected Versions
Proficy Information Portal 2.6
Previous versions may be vulnerable, as they were not tested.
Vendor fix will be available by Feb 15th.
A possible workaround is to remove the write permission of the IIS user from
the Proficy directory.
Additional Information
For additional information please contact us at Note
that we will respond only to verified utility personnel and governmental
The CVE identifier assigned to this vulnerability by CERT is CVE-2008-0175
This vulnerability was discovered and exploited by Eyal Udassin of C4.
Eyal Udassin - C4 (Formerly Swift Coders)
33 Jabotinsky St. The Twin Towers #1, Ramat Gan, Israel /


Go to the Top of This SecurityTracker Archive Page

Home   |    View Topics   |    Search   |    Contact Us

This web site uses cookies for web analytics. Learn More

Copyright 2021, LLC