The absence of filters when loading some sections in the web application of the vulnerable device allows potential attackers to inject malicious code that will be interpreted when a legitimate user accesses the web section (MAIL SERVER) where the information is displayed. Injection can be done on parameter MAIL_RCV. When a legitimate user attempts to review NOTIFICATION/MAIL SERVER, the injected code will be executed.
References
Link | Resource |
---|---|
https://www.cisa.gov/news-events/ics-advisories/icsa-23-250-03 | Third Party Advisory US Government Resource |
Configurations
Configuration 1 (hide)
AND |
|
History
21 Mar 2024, 02:48
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2023-09-18 20:15
Updated : 2024-08-02 19:15
NVD link : CVE-2023-40221
Mitre link : CVE-2023-40221
CVE.ORG link : CVE-2023-40221
JSON object : View
Products Affected
socomec
- modulys_gp
- modulys_gp_firmware
CWE
CWE-94
Improper Control of Generation of Code ('Code Injection')