Authenticated reflected XSS in ABB Cylon Aspect 3.08.02 via unsanitized GET parameters.
Reporter | Title | Published | Views | Family All 8 |
---|---|---|---|---|
CVE | CVE-2024-6516 | 5 Dec 202413:15 | ā | cve |
NVD | CVE-2024-6516 | 5 Dec 202413:15 | ā | nvd |
Cvelist | CVE-2024-6516 Cross Site Scripting XSS | 5 Dec 202412:24 | ā | cvelist |
Vulnrichment | CVE-2024-6516 Cross Site Scripting XSS | 5 Dec 202412:24 | ā | vulnrichment |
Zero Science Lab | ABB Cylon Aspect 3.08.02 (licenseServerUpdate.php) Stored Cross-Site Scripting | 10 Jan 202500:00 | ā | zeroscience |
Zero Science Lab | ABB Cylon Aspect 3.08.02 (licenseUpload.php) Stored Cross-Site Scripting | 10 Jan 202500:00 | ā | zeroscience |
Zero Science Lab | ABB Cylon Aspect 3.08.02 (bbmdUpdate.php) Remote Code Execution | 9 Jan 202500:00 | ā | zeroscience |
0day.today | ABB Cylon Aspect 3.08.02 bbmdUpdate.php Remote Code Execution Vulnerability | 9 Jan 202500:00 | ā | zdt |
<html><body><p>ABB Cylon Aspect 3.08.02 (WatchDogServlet) Authenticated Reflected XSS
Vendor: ABB Ltd.
Product web page: https://www.global.abb
Affected version: NEXUS Series, MATRIX-2 Series, ASPECT-Enterprise, ASPECT-Studio
Firmware: <=3.08.02
Summary: ASPECT is an award-winning scalable building energy management
and control solution designed to allow users seamless access to their
building data through standard building protocols including smart devices.
Desc: The ABB BMS/BAS controller suffers from an authenticated reflected
cross-site scripting vulnerability. Input passed to the GET parameter 'name'
is not properly sanitised before being returned to the user. This can be
exploited to execute arbitrary HTML/JS code in a user's browser session in
context of an affected site.
Tested on: GNU/Linux 3.15.10 (armv7l)
GNU/Linux 3.10.0 (x86_64)
GNU/Linux 2.6.32 (x86_64)
Intel(R) Atom(TM) Processor E3930 @ 1.30GHz
Intel(R) Xeon(R) Silver 4208 CPU @ 2.10GHz
PHP/7.3.11
PHP/5.6.30
PHP/5.4.16
PHP/4.4.8
PHP/5.3.3
AspectFT Automation Application Server
lighttpd/1.4.32
lighttpd/1.4.18
Apache/2.2.15 (CentOS)
OpenJDK Runtime Environment (rhel-2.6.22.1.-x86_64)
OpenJDK 64-Bit Server VM (build 24.261-b02, mixed mode)
ErgoTech MIX Deployment Server 2.0.0
Vulnerability discovered by Gjoko 'LiquidWorm' Krstic
@zeroscience
Advisory ID: ZSL-2024-5886
Advisory URL: https://www.zeroscience.mk/en/vulnerabilities/ZSL-2024-5886.php
CVE ID: CVE-2024-6516
CVE URL: https://www.cve.org/CVERecord?id=CVE-2024-6516
21.04.2024
--
$ cat project
P R O J E C T
.|
| |
|'| ._____
___ | | |. |' .---"|
_ .-' '-. | | .--'| || | _| |
.-'| _.| | || '-__ | | | || |
|' | |. | || | | | | || |
____| '-' ' "" '-' '-.' '` |____
āāāāāāāāāāāāāāāāāāāāāāāāāā āāāāāāāāāāāāāāāāāāāāāāāāāāāāāāā
āāāāāāāāāāāāāāāāāāāāāāāāāāāāāāāāāāāāāāāāāāāāāāāāāāāāāāāāāāā
āāāāāāāāāāāāāāāāāāāāāāāāāāāāāāāāāāāāāāāāāāāāāāāāāāāāāāāāāāā
āāāāāāāāāāāāāāāāāāāāāāāāāāāāāāāāāāāāāāāāāāāāāāāāāāāāāāāāāāā
āāāāāāāāāāāāāāāāāāāāāāāāāāāāāāāāāāāāāāāāāāāāāāāāāāāāāāāāāāā
āāāāāāāāāāāāāāāāāāāāāāāāāāāāāāāāāāāāāāāāāāāāāāāāāāāāāāāāāāā
āāāāāāāāāāāāāāāāāāāāāāāāāāāāāāāāāāāāāāāāāāāāāāāāāāāāāāāāāāā
āāāāāāāāāāāāāāāāāāāāāāāāā āāāāāāāāāāāā
āāāāāāāāāāāāāāāāāāāāāāāāāāāāāāāāāāāāāāā
āāāāāāāāāāāāāāāāāāāāāāāāāāāāāāāāāāāāāā
āāāāāāāāāāāāāāāāāāāāāāāāāāāāāāāāāāāāāāā
āāāāāāāāāāāāāāāāāāāāāāāāāāāāāāāāāāāāāāā
āāāāāāāāāāāāāāāāāāāāāāāāāāāāāāāāāāāāāāā
āāāāāāāāāāāāāāāāāāāāāāāāā āāāāāāāāāāāā
http://192.168.73.31:7226/servlet/WatchDogServlet?name=%3Cmarquee%3EZSL%3C/marquee%3E
</p></body></html>
Transform Your Security Services
Elevate your offerings with Vulners' advanced Vulnerability Intelligence. ContactĀ us for a demo andĀ discover the difference comprehensive, actionable intelligence can make in your security strategy.
Book a live demo