← Advisories

Wieland wieplan 4.1 Document Parsing Java Code Execution Using XMLDecoder

Critical
Advisory ID
ZSL-2016-5304
Release Date
10 February 2016
Vendor
Wieland Electric GmbH - http://www.wieland-electric.com
Affected Version
4.1 (Build 9)
CVE
N/A
Tested On
Microsoft Windows 7 Professional SP1 (EN), Microsoft Windows 7 Ultimate SP1 (EN), Java/1.8.0_73, Java/1.6.0_62
Summary

Your new software for the configuration of Wieland terminal rails. wieplan enables you to plan a complete terminal rail in a very simple way and to then place an order with Wieland. The configured terminal rail can be stored in DXF format and read into a CAD tool for further processing. Due to the intuitive user interface, the configuration of terminal rails with wieplan is easy.

Description

wieplan suffers from an arbitrary java code execution when parsing WIE documents that uses XMLDecoder, allowing system access to the affected machine. The software is used to generate custom specification order saved in .wie XML file that has to be sent to the vendor offices to be processed.

Proof of Concept
Disclosure Timeline
25.11.2015Vulnerability discovered.
08.12.2015Vendor contacted.
09.02.2016No response from the vendor.
10.02.2016Public security advisory released.
Credits
Vulnerability discovered by Gjoko Krstic
References
Changelog
10.02.2016Initial release
12.02.2016Added reference [2] and [3]
01.04.2016Added reference [4]