Description
Softing AG OPC Toolbox through 4.10.1.13035 allows /en/diag_values.html Stored XSS via the ITEMLISTVALUES##ITEMID parameter, resulting in JavaScript payload injection into the trace file. This payload will then be triggered every time an authenticated user browses the page containing it.
Published: 2021-04-02
Score: 5.4 Medium
EPSS: < 1% Very Low
KEV: No
Impact: n/a
Action: n/a
AI Analysis

No analysis available yet.

Remediation

No remediation available yet.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
EUVD EUVD EUVD-2021-16135 Softing AG OPC Toolbox through 4.10.1.13035 allows /en/diag_values.html Stored XSS via the ITEMLISTVALUES##ITEMID parameter, resulting in JavaScript payload injection into the trace file. This payload will then be triggered every time an authenticated user browses the page containing it.
References
History

No history.

Subscriptions

Softing Opc Toolbox
cve-icon MITRE

Status: PUBLISHED

Assigner: mitre

Published:

Updated: 2024-08-03T22:11:06.369Z

Reserved: 2021-03-31T00:00:00.000Z

Link: CVE-2021-29661

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Modified

Published: 2021-04-02T19:15:21.053

Modified: 2024-11-21T06:01:36.153

Link: CVE-2021-29661

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.

Weaknesses