An attacker with access to the web application that has the vulnerable software could introduce arbitrary JavaScript by injecting a cross-site scripting payload into the "autorefresh" parameter.
Metrics
Affected Vendors & Products
Advisories
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2023-49529 | An attacker with access to the web application that has the vulnerable software could introduce arbitrary JavaScript by injecting a cross-site scripting payload into the "autorefresh" parameter. |
Fixes
Solution
No solution given by the vendor.
Workaround
Westermo recommends following best practices for hardening, such as restricting access, disable unused services (attack surface reduction), etc., to mitigate the reported vulnerabilities. The reported cross-site scripting will be mitigated in a future report.
References
History
No history.
Status: PUBLISHED
Assigner: icscert
Published:
Updated: 2024-08-02T20:14:19.991Z
Reserved: 2023-10-12T20:21:27.716Z
Link: CVE-2023-45222
Updated: 2024-08-02T20:14:19.991Z
Status : Modified
Published: 2024-02-06T22:16:13.873
Modified: 2024-11-21T08:26:34.710
Link: CVE-2023-45222
No data.
OpenCVE Enrichment
No data.
EUVD