A vulnerability has been identified in SINEMA Remote Connect Server (All versions < V3.1). An error message pop up window in the web interface of the affected application does not prevent injection of JavaScript code.
This could allow attackers to perform reflected cross-site scripting (XSS) attacks.
References
Link | Resource |
---|---|
https://cert-portal.siemens.com/productcert/pdf/ssa-484086.pdf | Patch Vendor Advisory |
http://seclists.org/fulldisclosure/2022/Jun/35 | Exploit Mailing List Third Party Advisory |
http://packetstormsecurity.com/files/167554/SIEMENS-SINEMA-Remote-Connect-3.0.1.0-01.01.00.02-Cross-Site-Scripting.html | Exploit Mailing List Third Party Advisory |
https://cert-portal.siemens.com/productcert/html/ssa-484086.html |
Configurations
History
09 Jul 2024, 12:15
Type | Values Removed | Values Added |
---|---|---|
References |
|
|
Summary | A vulnerability has been identified in SINEMA Remote Connect Server (All versions < V3.1). An error message pop up window in the web interface of the affected application does not prevent injection of JavaScript code. This could allow attackers to perform reflected cross-site scripting (XSS) attacks. |
Information
Published : 2022-06-14 10:15
Updated : 2024-07-09 12:15
NVD link : CVE-2022-29034
Mitre link : CVE-2022-29034
JSON object : View
Products Affected
siemens
- sinema_remote_connect_server
CWE
CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')