- Advisory ID: BOSCH-2016-0701
- Published: 22 Jul 2016
- Last Updated: 14 Mar 2017
CVSSv3 Base Score:
- SQL Injection: 6.4
- XSS Injection: 6.1
Independent researcher, Maxim Rupp, identified a SQL injection and a cross-site scripting(XSS) vulnerability in Bosch Rexroth BLADEcontrol-WebVIS 3.0.2 and earlier. These vulnerabilities were initially reported by  . BLADEcontrol WebVIS is a website used to monitor metrics for wind turbines. It is not used to access or control BLADEcontrol systems or wind turbines itself. Bosch Rexroth has upgraded the website to mitigate these vulnerabilities. New user credentials are required for the new website.
The BLADEcontrol-WebVIS site was vulnerable to a SQL injection vulnerability in which database operations that were unintended by the web application designer could be preformed. These types of attacks, in some instances, can lead to a compromise of the database server or to remote code execution. The BLADEcontrol-WebVIS site was also vulnerable to a XSS vulnerability in which the site failed to validate, filter, or encode user input before returning it to a user’s web client. It is possible with the identified vulnerabilities to manipulate and delete data from the databases of the web server including user credentials.
Bosch Rexroth analysis has shown that there was one case where an attacker managed exploit the vulnerability to obtain user credentials consisting of generic user IDs and encrypted passwords. The vulnerable website has been shutdown and the affected accounts were blocked. Further analysis has shown that neither the obtained user credentials were used nor further unauthorised access to the servers occurred.
BLADEcontrol-WebVIS, Version 3.0.2 and earlier.
Bosch Rexroth has upgraded the website to WebVIS (v5.4) to mitigate these vulnerabilities. The upgraded website is available at https://webvis.bladecontrol.de .
New credentials must be generated for the website. If you have not already created an account please send an email with your previous username to firstname.lastname@example.org and a new account will be generated for you.
Vulnerability classification has been performed using the CVSSv3 scoring system (http://www.first.org/cvss/) . The CVSS environmental score is specific to each customer’s environment and should be defined by the customer to attain a final scoring.
- Please contact the Bosch PSIRT if you have feedback, comments, or additional information about this vulnerability at: email@example.com .
22 Jul 2016: Initial Publication
14 Mar 2017: Fix Advisory ID