An attacker with access to the Westermo Lynx web application that has the vulnerable software could introduce arbitrary JavaScript by injecting a cross-site scripting payload into the "forward.0.domain" parameter.
Metrics
Affected Vendors & Products
Advisories
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2023-44750 | An attacker with access to the Westermo Lynx web application that has the vulnerable software could introduce arbitrary JavaScript by injecting a cross-site scripting payload into the "forward.0.domain" parameter. |
Fixes
Solution
No solution given by the vendor.
Workaround
Westermo recommends following best practices for hardening, such as restricting access, disable unused services (attack surface reduction), etc., to mitigate the reported vulnerabilities. The reported cross-site scripting will be mitigated in a future report.
References
History
No history.
Status: PUBLISHED
Assigner: icscert
Published:
Updated: 2024-08-02T18:24:55.351Z
Reserved: 2023-10-12T20:21:27.711Z
Link: CVE-2023-40143
Updated: 2024-08-02T18:24:55.351Z
Status : Modified
Published: 2024-02-06T22:16:13.113
Modified: 2024-11-21T08:18:51.750
Link: CVE-2023-40143
No data.
OpenCVE Enrichment
No data.
EUVD