Description
In Phoenix Contact FL MGUARD 1102 and 1105 in Versions 1.4.0, 1.4.1 and 1.5.0 a user with high privileges can inject HTML code (XSS) through web-based management or the REST API with a manipulated certificate file.
Published: 2021-11-10
Score: 4.8 Medium
EPSS: < 1% Very Low
KEV: No
Impact: n/a
Action: n/a
AI Analysis

No analysis available yet.

Remediation

Vendor Solution

PHOENIX CONTACT recomments to upgrade to firmware version 1.5.1 (or any later version).


Vendor Workaround

If an untrusted user may have exploited the vulnerability, it is recommended to revoke access for that user, and to re-upload the certificates on the Basic settings > LDAP and Logs > Remote logging pages through the REST API (i.e., without viewing these pages in the web-based management).

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
EUVD EUVD EUVD-2021-21232 In Phoenix Contact FL MGUARD 1102 and 1105 in Versions 1.4.0, 1.4.1 and 1.5.0 a user with high privileges can inject HTML code (XSS) through web-based management or the REST API with a manipulated certificate file.
History

No history.

Subscriptions

Phoenixcontact Fl Mguard 1102 Fl Mguard 1102 Firmware Fl Mguard 1105 Fl Mguard 1105 Firmware
cve-icon MITRE

Status: PUBLISHED

Assigner: CERTVDE

Published:

Updated: 2024-09-16T20:11:38.654Z

Reserved: 2021-06-10T00:00:00.000Z

Link: CVE-2021-34582

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Modified

Published: 2021-11-10T12:15:15.227

Modified: 2024-11-21T06:10:44.977

Link: CVE-2021-34582

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.

Weaknesses