cve/2020/CVE-2020-12517.md

23 lines
1.3 KiB
Markdown
Raw Normal View History

2024-05-25 21:48:12 +02:00
### [CVE-2020-12517](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12517)
![](https://img.shields.io/static/v1?label=Product&message=AXC%20F%201152%20(1151412)&color=blue)
![](https://img.shields.io/static/v1?label=Product&message=AXC%20F%202152%20(2404267)&color=blue)
![](https://img.shields.io/static/v1?label=Product&message=AXC%20F%202152%20Starterkit%20(1046568)&color=blue)
![](https://img.shields.io/static/v1?label=Product&message=AXC%20F%203152%20(1069208)&color=blue)
![](https://img.shields.io/static/v1?label=Product&message=PLCnext%20Technology%20Starterkit%20(1188165)&color=blue)
![](https://img.shields.io/static/v1?label=Product&message=RFC%204072S%20(1051328&color=blue)
![](https://img.shields.io/static/v1?label=Version&message=%3C%202021.0%20LTS%20&color=brighgreen)
![](https://img.shields.io/static/v1?label=Vulnerability&message=CWE-79%20Cross-site%20Scripting%20(XSS)&color=brighgreen)
### Description
On Phoenix Contact PLCnext Control Devices versions before 2021.0 LTS an authenticated low privileged user could embed malicious Javascript code to gain admin rights when the admin user visits the vulnerable website (local privilege escalation).
### POC
#### Reference
- https://cert.vde.com/en-us/advisories/vde-2020-049
#### Github
No PoCs found on GitHub currently.