Softing AG OPC Toolbox through 4.10.1.13035 allows /en/diag_values.html Stored XSS via the ITEMLISTVALUES##ITEMID parameter, resulting in JavaScript payload injection into the trace file. This payload will then be triggered every time an authenticated user browses the page containing it.
References
Link | Resource |
---|---|
https://www.gruppotim.it/redteam | Exploit Third Party Advisory |
Configurations
History
No history.
Information
Published : 2021-04-02 19:15
Updated : 2024-02-04 21:47
NVD link : CVE-2021-29661
Mitre link : CVE-2021-29661
CVE.ORG link : CVE-2021-29661
JSON object : View
Products Affected
softing
- opc_toolbox
CWE
CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')