In Phoenix Contact FL MGUARD 1102 and 1105 in Versions 1.4.0, 1.4.1 and 1.5.0 a user with high privileges can inject HTML code (XSS) through web-based management or the REST API with a manipulated certificate file.
Advisories
Source ID Title
EUVD EUVD EUVD-2021-21232 In Phoenix Contact FL MGUARD 1102 and 1105 in Versions 1.4.0, 1.4.1 and 1.5.0 a user with high privileges can inject HTML code (XSS) through web-based management or the REST API with a manipulated certificate file.
Fixes

Solution

PHOENIX CONTACT recomments to upgrade to firmware version 1.5.1 (or any later version).


Workaround

If an untrusted user may have exploited the vulnerability, it is recommended to revoke access for that user, and to re-upload the certificates on the Basic settings > LDAP and Logs > Remote logging pages through the REST API (i.e., without viewing these pages in the web-based management).

History

No history.

cve-icon MITRE

Status: PUBLISHED

Assigner: CERTVDE

Published:

Updated: 2024-09-16T20:11:38.654Z

Reserved: 2021-06-10T00:00:00

Link: CVE-2021-34582

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Modified

Published: 2021-11-10T12:15:15.227

Modified: 2024-11-21T06:10:44.977

Link: CVE-2021-34582

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.