A vulnerability in the web-based management interface of Bosch PRAESIDEO until and including version 4.41 and Bosch PRAESENSA until and including version 1.10 allows an authenticated remote attacker with admin privileges to mount a stored Cross-Site-Scripting (XSS) attack against another user. When the victim logs into the management interface, the stored script code is executed in the context of his browser. A successful exploit would allow an attacker to interact with the management interface with the privileges of the victim. However, as the attacker already needs admin privileges, there is no additional impact on the management interface itself.
References
Link | Resource |
---|---|
https://psirt.bosch.com/security-advisories/bosch-sa-538331-bt.html | Vendor Advisory |
https://psirt.bosch.com/security-advisories/bosch-sa-538331-bt.html | Vendor Advisory |
Configurations
History
21 Nov 2024, 05:36
Type | Values Removed | Values Added |
---|---|---|
References | () https://psirt.bosch.com/security-advisories/bosch-sa-538331-bt.html - Vendor Advisory |
Information
Published : 2021-01-14 16:15
Updated : 2024-11-21 05:36
NVD link : CVE-2020-6777
Mitre link : CVE-2020-6777
CVE.ORG link : CVE-2020-6777
JSON object : View
Products Affected
bosch
- praesideo_firmware
- praesensa
- praesideo
- praesensa_firmware
CWE
CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')