The absence of filters when loading some sections in the web application of the vulnerable device allows potential attackers to inject malicious code that will be interpreted when a legitimate user accesses the web section (MAIL SERVER) where the information is displayed. Injection can be done on parameter MAIL_RCV. When a legitimate user attempts to review NOTIFICATION/MAIL SERVER, the injected code will be executed.













Subscriptions

Vendors Products
Socomec Subscribe
Modulys Gp Subscribe
Modulys Gp Firmware Subscribe

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
EUVD EUVD EUVD-2023-44818 The absence of filters when loading some sections in the web application of the vulnerable device allows potential attackers to inject malicious code that will be interpreted when a legitimate user accesses the web section (MAIL SERVER) where the information is displayed. Injection can be done on parameter MAIL_RCV. When a legitimate user attempts to review NOTIFICATION/MAIL SERVER, the injected code will be executed.
Fixes

Solution

Socomec reports that MODULYS GP (MOD3GP-SY-120K) is an End-of-Life product. Socomec recommends using MODULYS GP2 (M4-S-XXX) instead. MODULYS GP2 (M4-S-XXX) is not affected by the above vulnerabilities.


Workaround

No workaround given by the vendor.

History

No history.

cve-icon MITRE

Status: PUBLISHED

Assigner: icscert

Published:

Updated: 2024-08-02T18:24:55.947Z

Reserved: 2023-09-06T15:41:16.552Z

Link: CVE-2023-40221

cve-icon Vulnrichment

Updated: 2024-05-14T18:25:30.349Z

cve-icon NVD

Status : Modified

Published: 2023-09-18T20:15:09.907

Modified: 2024-11-21T08:19:01.930

Link: CVE-2023-40221

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.

Weaknesses