mirror of
https://github.com/fkie-cad/nvd-json-data-feeds.git
synced 2025-05-29 01:31:20 +00:00
133 lines
4.3 KiB
JSON
133 lines
4.3 KiB
JSON
{
|
|
"id": "CVE-2023-4523",
|
|
"sourceIdentifier": "ics-cert@hq.dhs.gov",
|
|
"published": "2023-09-27T19:15:12.373",
|
|
"lastModified": "2023-09-29T15:39:05.767",
|
|
"vulnStatus": "Analyzed",
|
|
"descriptions": [
|
|
{
|
|
"lang": "en",
|
|
"value": "\nReal Time Automation 460 Series products with versions prior to v8.9.8 are vulnerable to cross-site scripting, which could allow an attacker to run any JavaScript reference from the URL string. If this were to occur, the gateway's HTTP interface would redirect to the main page, which is index.htm.\n\n"
|
|
},
|
|
{
|
|
"lang": "es",
|
|
"value": "Los productos Real Time Automation Serie 460 con versiones anteriores a la v8.9.8 son vulnerables a Cross-Site Scripting (XSS), lo que podr\u00eda permitir a un atacante ejecutar cualquier referencia de JavaScript desde la cadena URL. Si esto ocurriera, la interfaz HTTP de la puerta de enlace redirigir\u00eda a la p\u00e1gina principal, que es index.htm."
|
|
}
|
|
],
|
|
"metrics": {
|
|
"cvssMetricV31": [
|
|
{
|
|
"source": "nvd@nist.gov",
|
|
"type": "Primary",
|
|
"cvssData": {
|
|
"version": "3.1",
|
|
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
|
|
"attackVector": "NETWORK",
|
|
"attackComplexity": "LOW",
|
|
"privilegesRequired": "NONE",
|
|
"userInteraction": "REQUIRED",
|
|
"scope": "CHANGED",
|
|
"confidentialityImpact": "LOW",
|
|
"integrityImpact": "LOW",
|
|
"availabilityImpact": "NONE",
|
|
"baseScore": 6.1,
|
|
"baseSeverity": "MEDIUM"
|
|
},
|
|
"exploitabilityScore": 2.8,
|
|
"impactScore": 2.7
|
|
},
|
|
{
|
|
"source": "ics-cert@hq.dhs.gov",
|
|
"type": "Secondary",
|
|
"cvssData": {
|
|
"version": "3.1",
|
|
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:L",
|
|
"attackVector": "NETWORK",
|
|
"attackComplexity": "LOW",
|
|
"privilegesRequired": "NONE",
|
|
"userInteraction": "NONE",
|
|
"scope": "UNCHANGED",
|
|
"confidentialityImpact": "HIGH",
|
|
"integrityImpact": "HIGH",
|
|
"availabilityImpact": "LOW",
|
|
"baseScore": 9.4,
|
|
"baseSeverity": "CRITICAL"
|
|
},
|
|
"exploitabilityScore": 3.9,
|
|
"impactScore": 5.5
|
|
}
|
|
]
|
|
},
|
|
"weaknesses": [
|
|
{
|
|
"source": "ics-cert@hq.dhs.gov",
|
|
"type": "Primary",
|
|
"description": [
|
|
{
|
|
"lang": "en",
|
|
"value": "CWE-79"
|
|
}
|
|
]
|
|
}
|
|
],
|
|
"configurations": [
|
|
{
|
|
"operator": "AND",
|
|
"nodes": [
|
|
{
|
|
"operator": "OR",
|
|
"negate": false,
|
|
"cpeMatch": [
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:rtautomation:460_series_firmware:*:*:*:*:*:*:*:*",
|
|
"versionEndExcluding": "8.9.8",
|
|
"matchCriteriaId": "C4FDC938-0147-4234-A952-0787C371E2DE"
|
|
}
|
|
]
|
|
},
|
|
{
|
|
"operator": "OR",
|
|
"negate": false,
|
|
"cpeMatch": [
|
|
{
|
|
"vulnerable": false,
|
|
"criteria": "cpe:2.3:h:rtautomation:460etcmm:-:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "5D1F8BBC-0375-4EF8-A2B7-06CAE092672E"
|
|
},
|
|
{
|
|
"vulnerable": false,
|
|
"criteria": "cpe:2.3:h:rtautomation:460mcbms:-:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "E4B3529A-8801-4703-BC36-224F58E314B4"
|
|
},
|
|
{
|
|
"vulnerable": false,
|
|
"criteria": "cpe:2.3:h:rtautomation:460mcbs:-:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "B3677DE5-0183-41AB-9A47-AA7413B55948"
|
|
},
|
|
{
|
|
"vulnerable": false,
|
|
"criteria": "cpe:2.3:h:rtautomation:460mmbms:-:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "9CACBF19-7A0A-4632-985C-44A677454F52"
|
|
},
|
|
{
|
|
"vulnerable": false,
|
|
"criteria": "cpe:2.3:h:rtautomation:460mmbs:-:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "20F5B7AC-5BD2-432D-91FE-BACB5DABAFD3"
|
|
}
|
|
]
|
|
}
|
|
]
|
|
}
|
|
],
|
|
"references": [
|
|
{
|
|
"url": "https://www.cisa.gov/news-events/ics-advisories/icsa-23-264-01",
|
|
"source": "ics-cert@hq.dhs.gov",
|
|
"tags": [
|
|
"Third Party Advisory",
|
|
"US Government Resource"
|
|
]
|
|
}
|
|
]
|
|
} |