A vulnerability has been identified in COMOS V10.2 (All versions only if web components are used), COMOS V10.3 (All versions < V10.3.3.3 only if web components are used), COMOS V10.4 (All versions < V10.4.1 only if web components are used). The COMOS Web component of COMOS accepts arbitrary code as attachment to tasks. This could allow an attacker to inject malicious code that is executed when loading the attachment.
References
Link | Resource |
---|---|
https://cert-portal.siemens.com/productcert/pdf/ssa-995338.pdf | Patch Vendor Advisory |
https://cert-portal.siemens.com/productcert/pdf/ssa-995338.pdf | Patch Vendor Advisory |
Configurations
Configuration 1 (hide)
|
History
21 Nov 2024, 06:14
Type | Values Removed | Values Added |
---|---|---|
References | () https://cert-portal.siemens.com/productcert/pdf/ssa-995338.pdf - Patch, Vendor Advisory |
Information
Published : 2022-01-11 12:15
Updated : 2024-11-21 06:14
NVD link : CVE-2021-37195
Mitre link : CVE-2021-37195
CVE.ORG link : CVE-2021-37195
JSON object : View
Products Affected
siemens
- comos