mirror of
https://github.com/0xMarcio/cve.git
synced 2025-05-06 02:31:38 +00:00
26 lines
1.7 KiB
Markdown
26 lines
1.7 KiB
Markdown
![]() |
### [CVE-2023-3526](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3526)
|
||
|

|
||
|

|
||
|

|
||
|

|
||
|

|
||
|

|
||
|

|
||
|

|
||
|

|
||
|
&color=brighgreen)
|
||
|
|
||
|
### Description
|
||
|
|
||
|
In PHOENIX CONTACTs TC ROUTER and TC CLOUD CLIENT in versions prior to 2.07.2 as well as CLOUD CLIENT 1101T-TX/TX prior to 2.06.10 an unauthenticated remote attacker could use a reflective XSS within the license viewer page of the devices in order to execute code in the context of the user's browser.
|
||
|
|
||
|
### POC
|
||
|
|
||
|
#### Reference
|
||
|
- http://packetstormsecurity.com/files/174152/Phoenix-Contact-TC-Cloud-TC-Router-2.x-XSS-Memory-Consumption.html
|
||
|
- http://seclists.org/fulldisclosure/2023/Aug/12
|
||
|
|
||
|
#### Github
|
||
|
No PoCs found on GitHub currently.
|
||
|
|