Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-f526-9q5m-qh6g

Опубликовано: 03 мая 2024
Источник: github
Github: Не прошло ревью
CVSS3: 8.3

Описание

Inductive Automation Ignition OPC UA Quick Client Cross-Site Scripting Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of Inductive Automation Ignition. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.

The specific flaw exists within the handling of the id parameter provided to the Inductive Automation Ignition web interface. The issue results from the lack of proper validation of user-supplied data, which can lead to the injection of an arbitrary script. An attacker can leverage this vulnerability to execute arbitrary code in the context of SYSTEM. Was ZDI-CAN-20355.

Inductive Automation Ignition OPC UA Quick Client Cross-Site Scripting Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of Inductive Automation Ignition. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.

The specific flaw exists within the handling of the id parameter provided to the Inductive Automation Ignition web interface. The issue results from the lack of proper validation of user-supplied data, which can lead to the injection of an arbitrary script. An attacker can leverage this vulnerability to execute arbitrary code in the context of SYSTEM. Was ZDI-CAN-20355.

EPSS

Процентиль: 82%
0.01727
Низкий

8.3 High

CVSS3

Дефекты

CWE-79

Связанные уязвимости

CVSS3: 9
nvd
почти 2 года назад

Inductive Automation Ignition OPC UA Quick Client Cross-Site Scripting Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of Inductive Automation Ignition. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the handling of the id parameter provided to the Inductive Automation Ignition web interface. The issue results from the lack of proper validation of user-supplied data, which can lead to the injection of an arbitrary script. An attacker can leverage this vulnerability to execute arbitrary code in the context of SYSTEM. Was ZDI-CAN-20355.

CVSS3: 8.3
fstec
почти 3 года назад

Уязвимость веб-интерфейса программного обеспечения для промышленной автоматизации Inductive Automation Ignition, позволяющая нарушителю проводить межсайтовые сценарные атаки

EPSS

Процентиль: 82%
0.01727
Низкий

8.3 High

CVSS3

Дефекты

CWE-79