[<prev] [next>] [day] [month] [year] [list]
Message-ID: <9E5E2A6A-12EC-41E2-B3BF-D7C872581067@cyberstruggle.org>
Date: Sat, 18 May 2019 14:19:56 +0300
From: Kubilay Onur Gungor <kubilay@...erstruggle.org>
To: <fulldisclosure@...lists.org>
Subject: [FD] Emerson Network Power Cross Site Scripting(XSS) Vulnerability
I. VULNERABILITY
-------------------------
httpGetSet/httpGet.htm on
Emerson Network Power Liebert Challenger 5.1E0.5 devices allows XSS via the statusstr parameter.
II. CVE REFERENCE
-------------------------
CVE-2019-12167
III. VENDOR
-------------------------
Emerson Network Power
IV. TIMELINE
-------------------------
13/05/2019 Vulnerability discovered
V. CREDIT
-------------------------
Kubilay Onur Gungor from Cyber Struggle
VI. DESCRIPTION
-------------------------
Cross Site Scripting (XSS) allows clients to inject scripts into a request and
have the server return the script to the client in the response. This occurs
because the application is taking untrusted data and reusing it
without performing any validation or sanitisation.
A remote user can conduct cross-site scripting attacks.
Affected Component:
Path(inurl): /httpGetSet/httpGet.htm?
Parameter: statusstr
VII. SOLUTION
-------------------------
Update to lastest version.
_______________________________________________
Sent through the Full Disclosure mailing list
https://nmap.org/mailman/listinfo/fulldisclosure
Web Archives & RSS: http://seclists.org/fulldisclosure/
Powered by blists - more mailing lists