2024-04-04 08:46:00 +00:00

103 lines
3.3 KiB
JSON

{
"id": "CVE-2023-5880",
"sourceIdentifier": "cve@rapid7.com",
"published": "2024-01-03T20:15:21.833",
"lastModified": "2024-01-11T18:26:04.750",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
"value": "When the Genie Company Aladdin Connect garage door opener (Retrofit-Kit Model ALDCM) is placed into configuration mode the web servers \u201cGarage Door Control Module Setup\u201d page is vulnerable to XSS via a broadcast SSID name containing malicious code with client side Java Script and/or HTML. This allows the attacker to inject malicious\u00a0code with client side Java Script and/or HTML into the users' web browser.\u00a0\n"
},
{
"lang": "es",
"value": "Cuando The Genie Company Aladdin Connect garage door opener(modelo ALDCM del kit de actualizaci\u00f3n) se coloca en modo de configuraci\u00f3n, la p\u00e1gina \"Garage Door Control Module Setup\" del servidor web es vulnerable a XSS a trav\u00e9s de un nombre SSID de transmisi\u00f3n que contiene c\u00f3digo malicioso con Java Script del lado del cliente y /o HTML. Esto permite al atacante inyectar c\u00f3digo malicioso con Java Script y/o HTML del lado del cliente en el navegador web de los usuarios."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 2.8,
"impactScore": 5.3
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-79"
}
]
},
{
"source": "cve@rapid7.com",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-79"
}
]
}
],
"configurations": [
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:geniecompany:aladdin_connect_garage_door_opener_firmware:*:*:*:*:*:*:*:*",
"versionEndIncluding": "14.1.1",
"matchCriteriaId": "CA29F57E-D2DF-4DCB-8280-741EBC06C1AF"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:geniecompany:aladdin_connect_garage_door_opener:-:*:*:*:*:*:*:*",
"matchCriteriaId": "666249EC-DBBC-48AD-80B3-FC124536B03D"
}
]
}
]
}
],
"references": [
{
"url": "https://www.rapid7.com/blog/post/2024/01/03/genie-aladdin-connect-retrofit-garage-door-opener-multiple-vulnerabilities/",
"source": "cve@rapid7.com",
"tags": [
"Mitigation",
"Vendor Advisory"
]
}
]
}