Share: Email | Twitter

ID

VDE-2022-056

Published

2022-12-14 08:00 (CET)

Last update

2022-12-14 09:16 (CET)

Vendor(s)

Weidmueller Interface GmbH & Co. KG

Product(s)

Article No┬░ Product Name Affected Version(s)
8000075041 19 IOT MD01 LAN H4 S0011 (contains IoT-GW30) = n/a
8000058270 FP IOT MD01 4EU S2 00000 (contains IoT-GW30-4G-EU) = n/a
8000058603 FP IOT MD01 LAN S2 00000 (contains IoT-GW30) = n/a
8000055224 FP IOT MD01 LAN S2 S0011 (contains IoT-GW30) = n/a
8000058282 FP IOT MD02 4EU S3 00000 (contains IoT-GW30-4G-EU) = n/a
2682620000 IoT-GW30 <= 1.16.0
2682630000 IoT-GW30-4G-EU <= 1.16.0
1334950000 UC20-WL2000-AC <= 1.16.0
1334990000 UC20-WL2000-IOT <= 1.16.0

Summary

A JavaScript injection vulnerability has been discovered in the XML editing system SCHEMA ST4 online
help by Quanos Solutions GmbH. For details refer to CVE.
This vulnerability may allow an attacker to inject JavaScript code via URL to the affected products


CVE ID

CVE-2022-3073

Last Update:

Dec. 14, 2022, 9:17 a.m.

Weakness

Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')  (CWE-79) 

Summary

Quanos "SCHEMA ST4" example web templates in version Bootstrap 2019 v2/2021 v1/2022 v1/2022 SP1 v1 or below are prone to JavaScript injection allowing a remote attacker to hijack existing sessions to e.g. other web services in the same environment or execute scripts in the users browser environment. The affected script is '*-schema.js'.

Details

 

Reported by

The vulnerability was discovered by Quanos Solutions GmbH.


Impact

This vulnerability may allow an attacker to inject JavaScript code via URL to the affected products.

As the affected products require authentication, exploiting this vulnerability would require an attacker to trick a logged in user into executing a malicious link.

Exploitation of this vulnerability may e.g. result in DoS of affected products or gaining access to sensitive information or gaining administrative access.

Solution

Mitigation

If the remediation cannot be implemented in a timely manner, Weidmueller strongly recommends that the authenticated user logged in to the product does not click on links from external sources.

Remediation

Weidmueller strongly recommends customers to install a patched firmware which fixes this vulnerability.

The fixed firmware for each affected product with at least version 1.17.0 can be obtained from weidmueller.com.

Reported by

The vulnerability was discovered by Quanos Solutions GmbH.

Weidmueller thanks CERT@VDE for the coordination and support with this publication and Quanos Solutions
GmbH for supporting coordinated vulnerability disclosure.