Description
Osprey Pump Controller version 1.01 inputs passed to a GET parameter are not properly sanitized before being returned to the user. This can be exploited to execute arbitrary HTML/JS code in a user's browser session in context of an affected site.
Related CPE's
References
https://www.cisa.gov/news-events/ics-advisories/icsa-23-082-06
Third Party AdvisoryUS Government Resource
https://www.cisa.gov/news-events/ics-advisories/icsa-23-082-06
Third Party AdvisoryUS Government Resource
CVSS impact metrics
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N
7.5 · High
Information
Source identifier
Vulnerability status
Modified
Published
2023-03-28T19:15:11.390Z
2 years agoLast modified
2024-11-21T06:55:44.227Z
1 year ago