search menu icon-carat-right cmu-wordmark

CERT Coordination Center


Allround Automations PL/SQL Developer v11 performs updates over HTTP

Vulnerability Note VU#229047

Original Release Date: 2016-04-25 | Last Revised: 2016-05-02

Overview

Allround Automations PL/SQL Developer version 11 checks for updates over HTTP and does not verify updates before executing commands, which may allow an attacker to execute arbitrary code.

Description

CWE-345: Insufficient Verification of Data Authenticity - CVE-2016-2346

According to the researcher, Allround Automations PL/SQL Developer version 11 periodically checks for updates over HTTP. When an update is available, PL/SQL Developer downloads the update and executes the update without verifying authenticity or performing other checks.

By intercepting such requests and modifying the necessary fields, an attacker with a man-in-the-middle position between the victim and the network may be able write arbitrary data to vulnerable devices and execute arbitrary code with permissions of the PL/SQL Developer user.

The researcher has published a blog post with more information.

Impact

A remote attacker with a man-in-the-middle position may able to execute code with permissions of the PL/SQL Developer user.

Solution

Apply an update

PL/SQL Developer version 11.0.6 has been released to address this issue. The update utility now uses HTTPS and restricts downloads to the allroundautomations.com domain.

Affected users may also consider the following workaround:

Avoid untrusted networks

Avoid using untrusted networks, including public WiFi. Using your device on an untrusted network increases the chance of falling victim to a man-in-the-middle attack that could intercept your HTTP data.

Vendor Information

229047
Expand all

Allround Automations

Notified:  March 16, 2016 Updated:  April 25, 2016

Statement Date:   April 19, 2016

Status

  Affected

Vendor Statement

No statement is currently available from the vendor regarding this vulnerability.

Vendor Information

We are not aware of further vendor information regarding this vulnerability.

Addendum

There are no additional comments at this time.

If you have feedback, comments, or additional information about this vulnerability, please send us email.


CVSS Metrics

Group Score Vector
Base 7.5 AV:N/AC:L/Au:N/C:P/I:P/A:P
Temporal 6.4 E:POC/RL:U/RC:UR
Environmental 4.8 CDP:ND/TD:M/CR:ND/IR:ND/AR:ND

References

Credit

Thanks to Adam Caudill for reporting this vulnerability.

This document was written by Garret Wassermann.

Other Information

CVE IDs: CVE-2016-2346
Date Public: 2016-04-29
Date First Published: 2016-04-25
Date Last Updated: 2016-05-02 15:23 UTC
Document Revision: 48

Sponsored by the Department of Homeland Security Office of Cybersecurity and Communications.