Description


Osprey Pump Controller version 1.01 inputs passed to a GET parameter are not properly sanitized before being returned to the user. This can be exploited to execute arbitrary HTML/JS code in a user's browser session in context of an affected site.

References


https://www.cisa.gov/news-events/ics-advisories/icsa-23-082-06

Third Party AdvisoryUS Government Resource

https://www.cisa.gov/news-events/ics-advisories/icsa-23-082-06

Third Party AdvisoryUS Government Resource

Weaknesses



CWE-79

CVSS impact metrics


CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N

7.5 · High

Information


Source identifier

[email protected]

Vulnerability status

Modified

Published

2023-03-28T19:15:11.390Z

2 years ago

Last modified

2024-11-21T06:55:44.227Z

1 year ago