rittal cmc_pu_iii_7030.000_firmware 在web页面生成时对输入的转义处理不恰当(跨站脚本)
CVE编号
CVE-2019-19393利用情况
暂无补丁情况
N/A披露时间
2020-10-02漏洞描述
The Web application on Rittal CMC PU III 7030.000 V3.00 V3.11.00_2 to V3.15.70_4 devices fails to sanitize user input on the system configurations page. This allows an attacker to backdoor the device with HTML and browser-interpreted content (such as JavaScript or other client-side scripts) as the content is always displayed after and before login. Persistent XSS allows an attacker to modify displayed content or to change the victim's information. Successful exploitation requires access to the web management interface, either with valid credentials or a hijacked session.解决建议
建议您更新当前系统或软件至最新版,完成漏洞的修复。
参考链接 |
|
---|---|
https://github.com/miguelhamal/CVE-2019-19393 | |
https://www.rittal.us/monitoring-security/cmc-iii.html |
受影响软件情况
# | 类型 | 厂商 | 产品 | 版本 | 影响面 | ||||
1 | |||||||||
---|---|---|---|---|---|---|---|---|---|
运行在以下环境 | |||||||||
系统 | rittal | cmc_pu_iii_7030.000_firmware | * | From (including) 3.11.00_2 | Up to (including) 3.15.70_4 | ||||
运行在以下环境 | |||||||||
硬件 | rittal | cmc_pu_iii_7030.000 | * | From (including) 3.00 | Up to (including) 6.01 |
- 攻击路径 网络
- 攻击复杂度 低
- 权限要求 无
- 影响范围 已更改
- 用户交互 需要
- 可用性 无
- 保密性 低
- 完整性 低
CWE-ID | 漏洞类型 |
CWE-79 | 在Web页面生成时对输入的转义处理不恰当(跨站脚本) |
Exp相关链接
- avd.aliyun.com
版权声明
本站原创文章转载请注明文章出处及链接,谢谢合作!
评论