siemens scalance_x302-7eec_firmware 在web页面生成时对输入的转义处理不恰当(跨站脚本)

CVE编号

CVE-2022-25756

利用情况

暂无

补丁情况

N/A

披露时间

2022-04-12
漏洞描述
A vulnerability has been identified in SCALANCE X302-7 EEC (230V), SCALANCE X302-7 EEC (230V, coated), SCALANCE X302-7 EEC (24V), SCALANCE X302-7 EEC (24V, coated), SCALANCE X302-7 EEC (2x 230V), SCALANCE X302-7 EEC (2x 230V, coated), SCALANCE X302-7 EEC (2x 24V), SCALANCE X302-7 EEC (2x 24V, coated), SCALANCE X304-2FE, SCALANCE X306-1LD FE, SCALANCE X307-2 EEC (230V), SCALANCE X307-2 EEC (230V, coated), SCALANCE X307-2 EEC (24V), SCALANCE X307-2 EEC (24V, coated), SCALANCE X307-2 EEC (2x 230V), SCALANCE X307-2 EEC (2x 230V, coated), SCALANCE X307-2 EEC (2x 24V), SCALANCE X307-2 EEC (2x 24V, coated), SCALANCE X307-3, SCALANCE X307-3, SCALANCE X307-3LD, SCALANCE X307-3LD, SCALANCE X308-2, SCALANCE X308-2, SCALANCE X308-2LD, SCALANCE X308-2LD, SCALANCE X308-2LH, SCALANCE X308-2LH, SCALANCE X308-2LH+, SCALANCE X308-2LH+, SCALANCE X308-2M, SCALANCE X308-2M, SCALANCE X308-2M PoE, SCALANCE X308-2M PoE, SCALANCE X308-2M TS, SCALANCE X308-2M TS, SCALANCE X310, SCALANCE X310, SCALANCE X310FE, SCALANCE X310FE, SCALANCE X320-1 FE, SCALANCE X320-1-2LD FE, SCALANCE X408-2, SCALANCE XR324-12M (230V, ports on front), SCALANCE XR324-12M (230V, ports on front), SCALANCE XR324-12M (230V, ports on rear), SCALANCE XR324-12M (230V, ports on rear), SCALANCE XR324-12M (24V, ports on front), SCALANCE XR324-12M (24V, ports on front), SCALANCE XR324-12M (24V, ports on rear), SCALANCE XR324-12M (24V, ports on rear), SCALANCE XR324-12M TS (24V), SCALANCE XR324-12M TS (24V), SCALANCE XR324-4M EEC (100-240VAC/60-250VDC, ports on front), SCALANCE XR324-4M EEC (100-240VAC/60-250VDC, ports on front), SCALANCE XR324-4M EEC (100-240VAC/60-250VDC, ports on rear), SCALANCE XR324-4M EEC (100-240VAC/60-250VDC, ports on rear), SCALANCE XR324-4M EEC (24V, ports on front), SCALANCE XR324-4M EEC (24V, ports on front), SCALANCE XR324-4M EEC (24V, ports on rear), SCALANCE XR324-4M EEC (24V, ports on rear), SCALANCE XR324-4M EEC (2x 100-240VAC/60-250VDC, ports on front), SCALANCE XR324-4M EEC (2x 100-240VAC/60-250VDC, ports on front), SCALANCE XR324-4M EEC (2x 100-240VAC/60-250VDC, ports on rear), SCALANCE XR324-4M EEC (2x 100-240VAC/60-250VDC, ports on rear), SCALANCE XR324-4M EEC (2x 24V, ports on front), SCALANCE XR324-4M EEC (2x 24V, ports on front), SCALANCE XR324-4M EEC (2x 24V, ports on rear), SCALANCE XR324-4M EEC (2x 24V, ports on rear), SCALANCE XR324-4M PoE (230V, ports on front), SCALANCE XR324-4M PoE (230V, ports on rear), SCALANCE XR324-4M PoE (24V, ports on front), SCALANCE XR324-4M PoE (24V, ports on rear), SCALANCE XR324-4M PoE TS (24V, ports on front), SIPLUS NET SCALANCE X308-2. The integrated web server could allow Cross-Site Scripting (XSS) attacks if unsuspecting users are tricked into accessing a malicious link. This can be used by an attacker to trigger a malicious request on the affected device.
解决建议
建议您更新当前系统或软件至最新版,完成漏洞的修复。
受影响软件情况
# 类型 厂商 产品 版本 影响面
1
运行在以下环境
系统 siemens scalance_x302-7eec_firmware * Up to
(excluding)
4.1.4
运行在以下环境
系统 siemens scalance_x304-2fe_firmware * Up to
(excluding)
4.1.4
运行在以下环境
系统 siemens scalance_x306-1ldfe_firmware * Up to
(excluding)
4.1.4
运行在以下环境
系统 siemens scalance_x307-2eec_firmware * Up to
(excluding)
4.1.4
运行在以下环境
系统 siemens scalance_x307-3ld_firmware * Up to
(excluding)
4.1.4
运行在以下环境
系统 siemens scalance_x307-3_firmware * Up to
(excluding)
4.1.4
运行在以下环境
系统 siemens scalance_x308-2ld_firmware * Up to
(excluding)
4.1.4
运行在以下环境
系统 siemens scalance_x308-2lh+_firmware * Up to
(excluding)
4.1.4
运行在以下环境
系统 siemens scalance_x308-2lh_firmware * Up to
(excluding)
4.1.4
运行在以下环境
系统 siemens scalance_x308-2m_firmware * Up to
(excluding)
4.1.4
运行在以下环境
系统 siemens scalance_x308-2m_poe_firmware - -
运行在以下环境
系统 siemens scalance_x308-2m_ts_firmware * Up to
(excluding)
4.1.4
运行在以下环境
系统 siemens scalance_x308-2_firmware * Up to
(excluding)
4.1.4
运行在以下环境
系统 siemens scalance_x310fe_firmware * Up to
(excluding)
4.1.4
运行在以下环境
系统 siemens scalance_x310_firmware * Up to
(excluding)
4.1.4
运行在以下环境
系统 siemens scalance_x320-1-2ldfe_firmware * Up to
(excluding)
4.1.4
运行在以下环境
系统 siemens scalance_x320-1fe_firmware * Up to
(excluding)
4.1.4
运行在以下环境
系统 siemens scalance_x408-2_firmware * Up to
(excluding)
4.1.4
运行在以下环境
系统 siemens scalance_xr324-12m_firmware * Up to
(excluding)
4.1.4
运行在以下环境
系统 siemens scalance_xr324-12m_ts_firmware * Up to
(excluding)
4.1.4
运行在以下环境
系统 siemens scalance_xr324-4m_eec_firmware * Up to
(excluding)
4.1.4
运行在以下环境
系统 siemens scalance_xr324-4m_poe_firmware * Up to
(excluding)
4.1.4
运行在以下环境
系统 siemens scalance_xr324-4m_poe_ts_firmware * Up to
(excluding)
4.1.4
运行在以下环境
系统 siemens siplus_net_scalance_x308-2_firmware * Up to
(excluding)
4.1.4
运行在以下环境
硬件 siemens scalance_x302-7eec - -
运行在以下环境
硬件 siemens scalance_x304-2fe - -
运行在以下环境
硬件 siemens scalance_x306-1ldfe - -
运行在以下环境
硬件 siemens scalance_x307-2eec - -
运行在以下环境
硬件 siemens scalance_x307-3 - -
运行在以下环境
硬件 siemens scalance_x307-3ld - -
运行在以下环境
硬件 siemens scalance_x308-2 - -
运行在以下环境
硬件 siemens scalance_x308-2ld - -
运行在以下环境
硬件 siemens scalance_x308-2lh - -
运行在以下环境
硬件 siemens scalance_x308-2lh+ - -
运行在以下环境
硬件 siemens scalance_x308-2m - -
运行在以下环境
硬件 siemens scalance_x308-2m_poe - -
运行在以下环境
硬件 siemens scalance_x308-2m_ts - -
运行在以下环境
硬件 siemens scalance_x310 - -
运行在以下环境
硬件 siemens scalance_x310fe - -
运行在以下环境
硬件 siemens scalance_x320-1-2ldfe - -
运行在以下环境
硬件 siemens scalance_x320-1fe - -
运行在以下环境
硬件 siemens scalance_x408-2 - -
运行在以下环境
硬件 siemens scalance_xr324-12m - -
运行在以下环境
硬件 siemens scalance_xr324-12m_ts - -
运行在以下环境
硬件 siemens scalance_xr324-4m_eec - -
运行在以下环境
硬件 siemens scalance_xr324-4m_poe - -
运行在以下环境
硬件 siemens scalance_xr324-4m_poe_ts - -
运行在以下环境
硬件 siemens siplus_net_scalance_x308-2 - -
CVSS3评分
6.1
  • 攻击路径
    网络
  • 攻击复杂度
  • 权限要求
  • 影响范围
    已更改
  • 用户交互
    需要
  • 可用性
  • 保密性
  • 完整性
CWE-ID 漏洞类型
CWE-79 在Web页面生成时对输入的转义处理不恰当(跨站脚本)
阿里云安全产品覆盖情况