CVE-2021-37195

A vulnerability has been identified in COMOS V10.2 (All versions only if web components are used), COMOS V10.3 (All versions < V10.3.3.3 only if web components are used), COMOS V10.4 (All versions < V10.4.1 only if web components are used). The COMOS Web component of COMOS accepts arbitrary code as attachment to tasks. This could allow an attacker to inject malicious code that is executed when loading the attachment.
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:siemens:comos:*:*:*:*:*:*:*:*
cpe:2.3:a:siemens:comos:*:*:*:*:*:*:*:*
cpe:2.3:a:siemens:comos:4.1:*:*:*:*:*:*:*

History

21 Nov 2024, 06:14

Type Values Removed Values Added
References () https://cert-portal.siemens.com/productcert/pdf/ssa-995338.pdf - Patch, Vendor Advisory () https://cert-portal.siemens.com/productcert/pdf/ssa-995338.pdf - Patch, Vendor Advisory

29 Apr 2022, 19:00

Type Values Removed Values Added
CVSS v2 : 4.3
v3 : 6.1
v2 : 2.6
v3 : 6.1
CPE cpe:2.3:a:siemens:comos:4.1:*:*:*:*:*:*:*

12 Apr 2022, 09:15

Type Values Removed Values Added
Summary A vulnerability has been identified in COMOS V10.2 (All versions only if web components are used), COMOS V10.3 (All versions < V10.3.3.2.14 only if web components are used), COMOS V10.4 (All versions < V10.4.1 only if web components are used). The COMOS Web component of COMOS accepts arbitrary code as attachment to tasks. This could allow an attacker to inject malicious code that is executed when loading the attachment. A vulnerability has been identified in COMOS V10.2 (All versions only if web components are used), COMOS V10.3 (All versions < V10.3.3.3 only if web components are used), COMOS V10.4 (All versions < V10.4.1 only if web components are used). The COMOS Web component of COMOS accepts arbitrary code as attachment to tasks. This could allow an attacker to inject malicious code that is executed when loading the attachment.

09 Feb 2022, 16:15

Type Values Removed Values Added
Summary A vulnerability has been identified in COMOS (All versions < V10.4.1). The COMOS Web component of COMOS accepts arbitrary code as attachment to tasks. This could allow an attacker to inject malicious code that is executed when loading the attachment. A vulnerability has been identified in COMOS V10.2 (All versions only if web components are used), COMOS V10.3 (All versions < V10.3.3.2.14 only if web components are used), COMOS V10.4 (All versions < V10.4.1 only if web components are used). The COMOS Web component of COMOS accepts arbitrary code as attachment to tasks. This could allow an attacker to inject malicious code that is executed when loading the attachment.

14 Jan 2022, 02:53

Type Values Removed Values Added
CPE cpe:2.3:a:siemens:comos:*:*:*:*:*:*:*:*
References (MISC) https://cert-portal.siemens.com/productcert/pdf/ssa-995338.pdf - (MISC) https://cert-portal.siemens.com/productcert/pdf/ssa-995338.pdf - Patch, Vendor Advisory
CVSS v2 : unknown
v3 : unknown
v2 : 4.3
v3 : 6.1
CWE CWE-79

11 Jan 2022, 12:45

Type Values Removed Values Added
New CVE

Information

Published : 2022-01-11 12:15

Updated : 2024-11-21 06:14


NVD link : CVE-2021-37195

Mitre link : CVE-2021-37195

CVE.ORG link : CVE-2021-37195


JSON object : View

Products Affected

siemens

  • comos
CWE
CWE-80

Improper Neutralization of Script-Related HTML Tags in a Web Page (Basic XSS)

CWE-79

Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')