Metrics
Affected Vendors & Products
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2021-21232 | In Phoenix Contact FL MGUARD 1102 and 1105 in Versions 1.4.0, 1.4.1 and 1.5.0 a user with high privileges can inject HTML code (XSS) through web-based management or the REST API with a manipulated certificate file. |
Solution
PHOENIX CONTACT recomments to upgrade to firmware version 1.5.1 (or any later version).
Workaround
If an untrusted user may have exploited the vulnerability, it is recommended to revoke access for that user, and to re-upload the certificates on the Basic settings > LDAP and Logs > Remote logging pages through the REST API (i.e., without viewing these pages in the web-based management).
| Link | Providers |
|---|---|
| https://cert.vde.com/en/advisories/VDE-2021-046/ |
|
No history.
Status: PUBLISHED
Assigner: CERTVDE
Published:
Updated: 2024-09-16T20:11:38.654Z
Reserved: 2021-06-10T00:00:00
Link: CVE-2021-34582
No data.
Status : Modified
Published: 2021-11-10T12:15:15.227
Modified: 2024-11-21T06:10:44.977
Link: CVE-2021-34582
No data.
OpenCVE Enrichment
No data.
EUVD