Lucene search

K
cve[email protected]CVE-2021-37195
HistoryJan 11, 2022 - 12:15 p.m.

CVE-2021-37195

2022-01-1112:15:09
CWE-79
CWE-80
web.nvd.nist.gov
47
cve-2021-37195
comos
web component
code injection
security vulnerability
nvd

CVSS2

2.6

Attack Vector

NETWORK

Attack Complexity

HIGH

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

PARTIAL

Availability Impact

NONE

AV:N/AC:H/Au:N/C:N/I:P/A:N

CVSS3

6.1

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

REQUIRED

Scope

CHANGED

Confidentiality Impact

LOW

Integrity Impact

LOW

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N

AI Score

6.3

Confidence

High

EPSS

0.001

Percentile

31.3%

A vulnerability has been identified in COMOS V10.2 (All versions only if web components are used), COMOS V10.3 (All versions < V10.3.3.3 only if web components are used), COMOS V10.4 (All versions < V10.4.1 only if web components are used). The COMOS Web component of COMOS accepts arbitrary code as attachment to tasks. This could allow an attacker to inject malicious code that is executed when loading the attachment.

Affected configurations

NVD
Node
siemenscomosRange10.2
OR
siemenscomosRange10.310.3.3.2.14
OR
siemenscomosMatch4.1
VendorProductVersionCPE
siemenscomoscpe:/a:siemens:comos::::
siemenscomos4.1cpe:/a:siemens:comos:4.1:::

CNA Affected

[
  {
    "product": "COMOS V10.2",
    "vendor": "Siemens",
    "versions": [
      {
        "status": "affected",
        "version": "All versions only if web components are used"
      }
    ]
  },
  {
    "product": "COMOS V10.3",
    "vendor": "Siemens",
    "versions": [
      {
        "status": "affected",
        "version": "All versions < V10.3.3.3 only if web components are used"
      }
    ]
  },
  {
    "product": "COMOS V10.4",
    "vendor": "Siemens",
    "versions": [
      {
        "status": "affected",
        "version": "All versions < V10.4.1 only if web components are used"
      }
    ]
  }
]

CVSS2

2.6

Attack Vector

NETWORK

Attack Complexity

HIGH

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

PARTIAL

Availability Impact

NONE

AV:N/AC:H/Au:N/C:N/I:P/A:N

CVSS3

6.1

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

REQUIRED

Scope

CHANGED

Confidentiality Impact

LOW

Integrity Impact

LOW

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N

AI Score

6.3

Confidence

High

EPSS

0.001

Percentile

31.3%

Related for CVE-2021-37195