Lucene search

K

ABB Cylon Aspect 3.08.02 (WatchDogServlet) Authenticated Reflected XSS

šŸ—“ļøĀ 24 Dec 2024Ā 00:00:00Reported byĀ Gjoko KrsticTypeĀ 
zeroscience
Ā zeroscience
šŸ”—Ā zeroscience.mkšŸ‘Ā 289Ā Views

Authenticated reflected XSS in ABB Cylon Aspect 3.08.02 via unsanitized GET parameters.

Show more
Related
Code
<html><body><p>ABB Cylon Aspect 3.08.02 (WatchDogServlet) Authenticated Reflected XSS


Vendor: ABB Ltd.
Product web page: https://www.global.abb
Affected version: NEXUS Series, MATRIX-2 Series, ASPECT-Enterprise, ASPECT-Studio
                  Firmware: &lt;=3.08.02

Summary: ASPECT is an award-winning scalable building energy management
and control solution designed to allow users seamless access to their
building data through standard building protocols including smart devices.

Desc: The ABB BMS/BAS controller suffers from an authenticated reflected
cross-site scripting vulnerability. Input passed to the GET parameter 'name'
is not properly sanitised before being returned to the user. This can be
exploited to execute arbitrary HTML/JS code in a user's browser session in
context of an affected site.

Tested on: GNU/Linux 3.15.10 (armv7l)
           GNU/Linux 3.10.0 (x86_64)
           GNU/Linux 2.6.32 (x86_64)
           Intel(R) Atom(TM) Processor E3930 @ 1.30GHz
           Intel(R) Xeon(R) Silver 4208 CPU @ 2.10GHz
           PHP/7.3.11
           PHP/5.6.30
           PHP/5.4.16
           PHP/4.4.8
           PHP/5.3.3
           AspectFT Automation Application Server
           lighttpd/1.4.32
           lighttpd/1.4.18
           Apache/2.2.15 (CentOS)
           OpenJDK Runtime Environment (rhel-2.6.22.1.-x86_64)
           OpenJDK 64-Bit Server VM (build 24.261-b02, mixed mode)
           ErgoTech MIX Deployment Server 2.0.0


Vulnerability discovered by Gjoko 'LiquidWorm' Krstic
                            @zeroscience


Advisory ID: ZSL-2024-5886
Advisory URL: https://www.zeroscience.mk/en/vulnerabilities/ZSL-2024-5886.php
CVE ID: CVE-2024-6516
CVE URL: https://www.cve.org/CVERecord?id=CVE-2024-6516


21.04.2024

--


$ cat project

                 P   R   O   J   E   C   T

                        .|
                        | |
                        |'|            ._____
                ___    |  |            |.   |' .---"|
        _    .-'   '-. |  |     .--'|  ||   | _|    |
     .-'|  _.|  |    ||   '-__  |   |  |    ||      |
     |' | |.    |    ||       | |   |  |    ||      |
 ____|  '-'     '    ""       '-'   '-.'    '`      |____
ā–‘ā–’ā–“ā–ˆā–ˆā–ˆā–ˆā–ˆā–ˆā–ˆā–“ā–’ā–‘ā–‘ā–’ā–“ā–ˆā–ˆā–ˆā–ˆā–ˆā–ˆā–ˆā–“ā–’ā–‘ ā–‘ā–’ā–“ā–ˆā–ˆā–ˆā–ˆā–ˆā–ˆā–“ā–’ā–‘ā–‘ā–’ā–“ā–ˆā–“ā–’ā–‘ā–’ā–“ā–ˆā–ˆā–ˆā–ˆā–ˆā–ˆā–ˆā–“ā–’ā–‘  
ā–‘ā–’ā–“ā–ˆā–“ā–’ā–‘ā–‘ā–’ā–“ā–ˆā–“ā–’ā–‘ā–’ā–“ā–ˆā–“ā–’ā–‘ā–‘ā–’ā–“ā–ˆā–“ā–’ā–‘ā–’ā–“ā–ˆā–“ā–’ā–‘ā–‘ā–’ā–“ā–ˆā–“ā–’ā–‘ā–’ā–“ā–ˆā–“ā–’ā–‘ā–’ā–“ā–ˆā–“ā–’ā–‘ā–‘ā–’ā–“ā–ˆā–“ā–’ā–‘ 
ā–‘ā–’ā–“ā–ˆā–“ā–’ā–‘ā–‘ā–’ā–“ā–ˆā–“ā–’ā–‘ā–’ā–“ā–ˆā–“ā–’ā–‘ā–‘ā–’ā–“ā–ˆā–“ā–’ā–‘ā–’ā–“ā–ˆā–“ā–’ā–‘ā–‘ā–’ā–“ā–ˆā–“ā–’ā–‘ā–’ā–“ā–ˆā–“ā–’ā–‘ā–’ā–“ā–ˆā–“ā–’ā–‘ā–‘ā–’ā–“ā–ˆā–“ā–’ā–‘ 
ā–‘ā–’ā–“ā–ˆā–ˆā–ˆā–ˆā–ˆā–ˆā–ˆā–“ā–’ā–‘ā–‘ā–’ā–“ā–ˆā–ˆā–ˆā–ˆā–ˆā–ˆā–ˆā–“ā–’ā–‘ā–‘ā–’ā–“ā–ˆā–ˆā–ˆā–ˆā–ˆā–ˆā–ˆā–ˆā–“ā–’ā–‘ā–’ā–“ā–ˆā–“ā–’ā–‘ā–’ā–“ā–ˆā–“ā–’ā–‘ā–‘ā–’ā–“ā–ˆā–“ā–’ā–‘ 
ā–‘ā–’ā–“ā–ˆā–“ā–’ā–‘ā–‘ā–’ā–“ā–ˆā–“ā–’ā–‘ā–’ā–“ā–ˆā–“ā–’ā–‘ā–‘ā–’ā–“ā–ˆā–“ā–’ā–‘ā–’ā–“ā–ˆā–“ā–’ā–‘ā–‘ā–’ā–“ā–ˆā–“ā–’ā–‘ā–’ā–“ā–ˆā–“ā–’ā–‘ā–’ā–“ā–ˆā–“ā–’ā–‘ā–‘ā–’ā–“ā–ˆā–“ā–’ā–‘ 
ā–‘ā–’ā–“ā–ˆā–“ā–’ā–‘ā–‘ā–’ā–“ā–ˆā–“ā–’ā–‘ā–’ā–“ā–ˆā–“ā–’ā–‘ā–‘ā–’ā–“ā–ˆā–“ā–’ā–‘ā–’ā–“ā–ˆā–“ā–’ā–‘ā–‘ā–’ā–“ā–ˆā–“ā–’ā–‘ā–’ā–“ā–ˆā–“ā–’ā–‘ā–’ā–“ā–ˆā–“ā–’ā–‘ā–‘ā–’ā–“ā–ˆā–“ā–’ā–‘ 
ā–‘ā–’ā–“ā–ˆā–ˆā–ˆā–ˆā–ˆā–ˆā–ˆā–“ā–’ā–‘ā–‘ā–’ā–“ā–ˆā–“ā–’ā–‘ā–‘ā–’ā–“ā–ˆā–“ā–’ā–‘ā–’ā–“ā–ˆā–“ā–’ā–‘ā–‘ā–’ā–“ā–ˆā–“ā–’ā–‘ā–’ā–“ā–ˆā–“ā–’ā–‘ā–’ā–“ā–ˆā–“ā–’ā–‘ā–‘ā–’ā–“ā–ˆā–“ā–’ā–‘                                                            
         ā–‘ā–’ā–“ā–ˆā–ˆā–ˆā–ˆā–ˆā–ˆā–ˆā–ˆā–“ā–’ā–‘ā–’ā–“ā–ˆā–ˆā–ˆā–ˆā–ˆā–ˆā–“ā–’ā–‘ ā–‘ā–’ā–“ā–ˆā–ˆā–ˆā–ˆā–ˆā–ˆā–“ā–’ā–‘ 
         ā–‘ā–’ā–“ā–ˆā–“ā–’ā–‘ā–‘ā–‘ā–‘ā–‘ā–‘ā–‘ā–’ā–“ā–ˆā–“ā–’ā–‘ā–‘ā–’ā–“ā–ˆā–“ā–’ā–‘ā–’ā–“ā–ˆā–“ā–’ā–‘ā–‘ā–’ā–“ā–ˆā–“ā–’ā–‘
         ā–‘ā–’ā–“ā–ˆā–“ā–’ā–‘ā–‘ā–‘ā–‘ā–‘ā–‘ā–‘ā–’ā–“ā–ˆā–“ā–’ā–‘ā–‘ā–’ā–“ā–ˆā–“ā–’ā–‘ā–’ā–“ā–ˆā–“ā–’ā–‘ā–‘ā–‘ā–‘ā–‘ā–‘ā–‘ 
         ā–‘ā–’ā–“ā–ˆā–ˆā–ˆā–ˆā–ˆā–ˆā–“ā–’ā–‘ā–‘ā–’ā–“ā–ˆā–“ā–’ā–‘ā–‘ā–’ā–“ā–ˆā–“ā–’ā–‘ā–’ā–“ā–ˆā–“ā–’ā–’ā–“ā–ˆā–ˆā–ˆā–“ā–’ā–‘
         ā–‘ā–’ā–“ā–ˆā–“ā–’ā–‘ā–‘ā–‘ā–‘ā–‘ā–‘ā–‘ā–’ā–“ā–ˆā–“ā–’ā–‘ā–‘ā–’ā–“ā–ˆā–“ā–’ā–‘ā–’ā–“ā–ˆā–“ā–’ā–‘ā–‘ā–’ā–“ā–ˆā–“ā–’ā–‘
         ā–‘ā–’ā–“ā–ˆā–“ā–’ā–‘ā–‘ā–‘ā–‘ā–‘ā–‘ā–‘ā–’ā–“ā–ˆā–“ā–’ā–‘ā–‘ā–’ā–“ā–ˆā–“ā–’ā–‘ā–’ā–“ā–ˆā–“ā–’ā–‘ā–‘ā–’ā–“ā–ˆā–“ā–’ā–‘
         ā–‘ā–’ā–“ā–ˆā–“ā–’ā–‘ā–‘ā–‘ā–‘ā–‘ā–‘ā–‘ā–‘ā–’ā–“ā–ˆā–ˆā–ˆā–ˆā–ˆā–ˆā–“ā–’ā–‘ ā–‘ā–’ā–“ā–ˆā–ˆā–ˆā–ˆā–ˆā–ˆā–“ā–’ā–‘                                               
                                                                                                               

http://192.168.73.31:7226/servlet/WatchDogServlet?name=%3Cmarquee%3EZSL%3C/marquee%3E
</p></body></html>

Transform Your Security Services

Elevate your offerings with Vulners' advanced Vulnerability Intelligence. ContactĀ us for a demo andĀ discover the difference comprehensive, actionable intelligence can make in your security strategy.

Book a live demo
24 Dec 2024 00:00Current
5.8Medium risk
Vulners AI Score5.8
CVSS39
CVSS49.3
SSVC
289
.json
Report