Security
Headlines
HeadlinesLatestCVEs

Headline

CVE-2022-3073: VDE-2022-056 | CERT@VDE

Quanos “SCHEMA ST4” example web templates in version Bootstrap 2019 v2/2021 v1/2022 v1/2022 SP1 v1 or below are prone to JavaScript injection allowing a remote attacker to hijack existing sessions to e.g. other web services in the same environment or execute scripts in the users browser environment. The affected script is '*-schema.js’.

CVE
#xss#vulnerability#web#js#java#auth

2022-12-14 08:00 (CET) VDE-2022-056

Weidmueller: Multiple IoT and control products affected by JavaScript injection vulnerability
Share: Email | Twitter

Published

2022-12-14 08:00 (CET)

Last update

2022-12-14 09:16 (CET)

Vendor(s)

Weidmueller Interface GmbH & Co. KG

Product(s)

Article No°

Product Name

Affected Version(s)

8000075041

19 IOT MD01 LAN H4 S0011 (contains IoT-GW30)

= n/a

8000058270

FP IOT MD01 4EU S2 00000 (contains IoT-GW30-4G-EU)

= n/a

8000058603

FP IOT MD01 LAN S2 00000 (contains IoT-GW30)

= n/a

8000055224

FP IOT MD01 LAN S2 S0011 (contains IoT-GW30)

= n/a

8000058282

FP IOT MD02 4EU S3 00000 (contains IoT-GW30-4G-EU)

= n/a

2682620000

IoT-GW30

<= 1.16.0

2682630000

IoT-GW30-4G-EU

<= 1.16.0

1334950000

UC20-WL2000-AC

<= 1.16.0

1334990000

UC20-WL2000-IOT

<= 1.16.0

Summary

A JavaScript injection vulnerability has been discovered in the XML editing system SCHEMA ST4 online
help by Quanos Solutions GmbH. For details refer to CVE.
This vulnerability may allow an attacker to inject JavaScript code via URL to the affected products

Last Update:

14. Dezember 2022 09:17

Severity

Weakness

Improper Neutralization of Input During Web Page Generation (‘Cross-site Scripting’) (CWE-79)

Summary

Quanos “SCHEMA ST4” example web templates in version Bootstrap 2019 v2/2021 v1/2022 v1/2022 SP1 v1 or below are prone to JavaScript injection allowing a remote attacker to hijack existing sessions to e.g. other web services in the same environment or execute scripts in the users browser environment. The affected script is '*-schema.js’.

Details

Reported by

The vulnerability was discovered by Quanos Solutions GmbH.

Impact

This vulnerability may allow an attacker to inject JavaScript code via URL to the affected products.

As the affected products require authentication, exploiting this vulnerability would require an attacker to trick a logged in user into executing a malicious link.

Exploitation of this vulnerability may e.g. result in DoS of affected products or gaining access to sensitive information or gaining administrative access.

Solution

Mitigation

If the remediation cannot be implemented in a timely manner, Weidmueller strongly recommends that the authenticated user logged in to the product does not click on links from external sources.

Remediation

Weidmueller strongly recommends customers to install a patched firmware which fixes this vulnerability.

The fixed firmware for each affected product with at least version 1.17.0 can be obtained from weidmueller.com.

Reported by

The vulnerability was discovered by Quanos Solutions GmbH.

Weidmueller thanks CERT@VDE for the coordination and support with this publication and Quanos Solutions
GmbH for supporting coordinated vulnerability disclosure.

CVE: Latest News

CVE-2023-50976: Transactions API Authorization by oleiman · Pull Request #14969 · redpanda-data/redpanda