Softing AG OPC Toolbox through 4.10.1.13035 allows /en/diag_values.html Stored XSS via the ITEMLISTVALUES##ITEMID parameter, resulting in JavaScript payload injection into the trace file. This payload will then be triggered every time an authenticated user browses the page containing it.
References
Link | Resource |
---|---|
https://www.gruppotim.it/redteam | Exploit Third Party Advisory |
Configurations
Information
Published : 2021-04-02 12:15
Updated : 2021-04-07 20:20
NVD link : CVE-2021-29661
Mitre link : CVE-2021-29661
JSON object : View
CWE
CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
Products Affected
softing
- opc_toolbox