Ecava IntegraXor Directory Traversal
All information products included in http://ics-cert.us-cert.gov are provided "as is" for informational purposes only. The Department of Homeland Security (DHS) does not provide any warranties of any kind regarding any information contained within. DHS does not endorse any commercial product or service, referenced in this product or otherwise. Further dissemination of this product is governed by the Traffic Light Protocol (TLP) marking in the header. For more information about TLP, see http://www.us-cert.gov/tlp/.
A cybersecurity researcher has reported a new vulnerability in Ecava IntegraXor. The web server is susceptible to a directory traversal attack. Exploit code is available.
IntegraXor is a suite of tools used to create and run a web-based human-machine interface (HMI) for a Supervisory Control and Data Acquisition (SCADA) system and is used primarily in Malaysia. Ecava specializes in factory and process automation solutions.
ICS-CERT has not independently verified this vulnerability. ICS-CERT is providing this information as an immediate notification of new activity and is working with the vendor on mitigation options. Further information will be released as it becomes available.
ICS-CERT released a follow-up advisory titled ICSA-10-362-01 Ecava IntegraXor Directory Traversal on the ICS-CERT Web site, on December 28, 2010.
For any questions related to this report, please contact the NCCIC at:
Toll Free: 1-888-282-0870
The NCCIC continuously strives to improve its products and services. You can help by choosing one of the links below to provide feedback about this product.