CVE-2021-26828

8.8 HIGH

📋 TL;DR

This vulnerability allows remote authenticated users to upload and execute arbitrary JSP files via the view_edit.shtm endpoint in ScadaBR. This leads to remote code execution on affected systems. Users of ScadaBR versions through 0.9.1 on Linux and through 1.12.4 on Windows are affected.

💻 Affected Systems

Products:
  • ScadaBR
Versions: Linux: through 0.9.1, Windows: through 1.12.4
Operating Systems: Linux, Windows
Default Config Vulnerable: ⚠️ Yes
Notes: Requires authenticated access, but default configurations may allow exploitation if authentication is obtained.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Full system compromise allowing attackers to execute arbitrary commands, steal sensitive industrial control data, manipulate SCADA operations, and pivot to other network systems.

🟠

Likely Case

Attackers gain shell access to the SCADA server, potentially disrupting industrial processes, exfiltrating sensitive data, or installing persistent backdoors.

🟢

If Mitigated

Limited impact with proper network segmentation, strong authentication controls, and file upload restrictions in place.

🌐 Internet-Facing: HIGH - Internet-facing instances are directly exploitable by authenticated attackers, leading to complete system compromise.
🏢 Internal Only: HIGH - Even internally, authenticated users or compromised accounts can exploit this to gain full control of SCADA systems.

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: CONFIRMED
Unauthenticated Exploit: ✅ No
Complexity: LOW

Public exploit code and demonstration videos are available. Exploitation requires authenticated access but is straightforward once credentials are obtained.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Not specified in available references

Vendor Advisory: http://forum.scadabr.com.br/t/report-falhas-de-seguranca-em-versoes-do-scadabr/3615/4

Restart Required: No

Instructions:

No official patch available. Consider upgrading to newer versions if available, or implement workarounds and security controls.

🔧 Temporary Workarounds

Restrict file upload functionality

all

Disable or restrict the view_edit.shtm endpoint and file upload capabilities in ScadaBR configuration.

# Modify ScadaBR configuration to disable vulnerable endpoints
# Consult ScadaBR documentation for specific configuration changes

Implement web application firewall rules

linux

Block requests to view_edit.shtm and filter JSP file uploads at the network perimeter.

# Example WAF rule to block view_edit.shtm requests
# Example: iptables -A INPUT -p tcp --dport 80 -m string --string "view_edit.shtm" --algo bm -j DROP

🧯 If You Can't Patch

  • Implement strict network segmentation to isolate SCADA systems from other networks.
  • Enforce strong authentication policies and monitor for suspicious login attempts.

🔍 How to Verify

Check if Vulnerable:

Check ScadaBR version: Linux versions ≤0.9.1 or Windows versions ≤1.12.4 are vulnerable. Test authenticated access to view_edit.shtm endpoint.

Check Version:

# Check ScadaBR version via web interface or configuration files

Verify Fix Applied:

Verify that view_edit.shtm endpoint is no longer accessible or file upload functionality is properly restricted.

📡 Detection & Monitoring

Log Indicators:

  • Unusual file uploads to view_edit.shtm
  • JSP file creation in unexpected directories
  • Authentication logs showing brute force attempts

Network Indicators:

  • HTTP POST requests to view_edit.shtm with file uploads
  • Unexpected outbound connections from SCADA systems

SIEM Query:

source="web_logs" AND uri="/view_edit.shtm" AND method="POST" AND status=200

🔗 References

📤 Share & Export