abb modular_switchgear_monitoring_firmware 跨站请求伪造(csrf)
CVE编号
CVE-2021-40336利用情况
暂无补丁情况
N/A披露时间
2022-07-25漏洞描述
A vulnerability exists in the http web interface where the web interface does not validate data in an HTTP header. This causes a possible HTTP response splitting, which if exploited could lead an attacker to channel down harmful code into the user’s web browser, such as to steal the session cookies. Thus, an attacker who successfully makes an MSM user who has already established a session to MSM web interface clicks a forged link to the MSM web interface, e.g., the link is sent per E-Mail, could trick the user into downloading malicious software onto his computer. This issue affects: Hitachi Energy MSM V2.2 and prior versions.解决建议
建议您更新当前系统或软件至最新版,完成漏洞的修复。
参考链接 |
|
---|---|
https://search.abb.com/library/Download.aspx?DocumentID=8DBD000085&LanguageCo... |
受影响软件情况
# | 类型 | 厂商 | 产品 | 版本 | 影响面 | ||||
1 | |||||||||
---|---|---|---|---|---|---|---|---|---|
运行在以下环境 | |||||||||
系统 | abb | modular_switchgear_monitoring_firmware | * | Up to (including) 2.2.0 | |||||
运行在以下环境 | |||||||||
硬件 | abb | modular_switchgear_monitoring | - | - |
- 攻击路径 网络
- 攻击复杂度 低
- 权限要求 无
- 影响范围 未更改
- 用户交互 需要
- 可用性 高
- 保密性 高
- 完整性 高
CWE-ID | 漏洞类型 |
CWE-352 | 跨站请求伪造(CSRF) |
CWE-74 | 输出中的特殊元素转义处理不恰当(注入) |
Exp相关链接

版权声明
本站原创文章转载请注明文章出处及链接,谢谢合作!
评论