An attacker with access to the web application with vulnerable software could introduce arbitrary JavaScript by injecting a cross-site scripting payload into the "dns.0.server" parameter.
Metrics
Affected Vendors & Products
Advisories
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2023-49533 | An attacker with access to the web application with vulnerable software could introduce arbitrary JavaScript by injecting a cross-site scripting payload into the "dns.0.server" parameter. |
Fixes
Solution
No solution given by the vendor.
Workaround
Westermo recommends following best practices for hardening, such as restricting access, disable unused services (attack surface reduction), etc., to mitigate the reported vulnerabilities. The reported cross-site scripting will be mitigated in a future report.
References
History
No history.
Status: PUBLISHED
Assigner: icscert
Published:
Updated: 2024-08-02T20:14:19.933Z
Reserved: 2023-10-12T20:21:27.773Z
Link: CVE-2023-45227
Updated: 2024-08-02T20:14:19.933Z
Status : Modified
Published: 2024-02-06T22:16:14.050
Modified: 2024-11-21T08:26:35.313
Link: CVE-2023-45227
No data.
OpenCVE Enrichment
No data.
EUVD