A stored cross-site scripting vulnerability exists in the web application functionality of Moxa SDS-3008 Series Industrial Ethernet Switch 2.1. A specially-crafted HTTP request can lead to arbitrary Javascript execution. An attacker can send an HTTP request to trigger this vulnerability.Form field id="webLocationMessage_text" name="webLocationMessage_text"
References
Link | Resource |
---|---|
https://talosintelligence.com/vulnerability_reports/TALOS-2022-1619 | Exploit Third Party Advisory |
https://www.moxa.com/en/support/product-support/security-advisory/sds-3008-series-multiple-web-vulnerabilities | Vendor Advisory |
https://talosintelligence.com/vulnerability_reports/TALOS-2022-1619 | Exploit Third Party Advisory |
https://www.moxa.com/en/support/product-support/security-advisory/sds-3008-series-multiple-web-vulnerabilities | Vendor Advisory |
Configurations
History
21 Nov 2024, 07:23
Type | Values Removed | Values Added |
---|---|---|
References | () https://talosintelligence.com/vulnerability_reports/TALOS-2022-1619 - Exploit, Third Party Advisory | |
References | () https://www.moxa.com/en/support/product-support/security-advisory/sds-3008-series-multiple-web-vulnerabilities - Vendor Advisory |
Information
Published : 2023-02-07 17:15
Updated : 2024-11-21 07:23
NVD link : CVE-2022-41311
Mitre link : CVE-2022-41311
CVE.ORG link : CVE-2022-41311
JSON object : View
Products Affected
moxa
- sds-3008-t
- sds-3008-t_firmware
- sds-3008_firmware
- sds-3008
CWE
CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')