SUBNET PowerSYSTEM Center versions 2020 U10 and prior contain a cross-site scripting vulnerability that may allow an attacker to inject malicious code into report header graphic files that could propagate out of the system and reach users who are subscribed to email notifications.
Metrics
Affected Vendors & Products
Source | ID | Title |
---|---|---|
![]() |
EUVD-2023-36902 | SUBNET PowerSYSTEM Center versions 2020 U10 and prior contain a cross-site scripting vulnerability that may allow an attacker to inject malicious code into report header graphic files that could propagate out of the system and reach users who are subscribed to email notifications. |
Solution
SUBNET Solutions has fixed these issues by enabling a file integrity check on uploaded images and anti-forgery tokens to prevent replay attacks. The fix was introduced in PowerSYSTEM Center update 12 as well as Update 8+Hotfix (both identified by release number 5.12.2305.10101, which can be located in Settings / Overview / Version).
Workaround
SUBNET Solutions recommends users to follow the following workarounds: * Users should verify that SVG files do not contain HTML elements or scripts and validate that JPG and PNG files are not SVG files. * Users should verify network security rules to ensure that outbound connections to the internet are not possible. * If the above cannot be performed or notifications are not required, disable email notifications for reports from PowerSYSTEM Center. * Monitor user activity and ensure application control rules only allow preauthorized executables to run. * Deny users to run other executables on client access servers (PowerSYSTEM Center front end access point).
Mon, 09 Dec 2024 21:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Metrics |
ssvc
|

Status: PUBLISHED
Assigner: icscert
Published:
Updated: 2024-12-09T20:48:27.468Z
Reserved: 2023-05-25T16:04:56.572Z
Link: CVE-2023-32659

Updated: 2024-08-02T15:25:36.325Z

Status : Modified
Published: 2023-06-19T21:15:42.113
Modified: 2024-11-21T08:03:47.627
Link: CVE-2023-32659

No data.

No data.