vendor:
WebCTRL OEM
by:
3ndG4me
6.1
CVSS
MEDIUM
Reflected Cross-Site Scripting (XSS)
79
CWE
Product Name: WebCTRL OEM
Affected Version From: 6.5
Affected Version To: 6.5
Patch Exists: YES
Related CWE: CVE-2021-31682
CPE: a:automated_logic:webctrl_oem
Tags: cve,cve2021,webctrl,xss,packetstorm
CVSS Metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
Nuclei References:
https://nvd.nist.gov/vuln/detail/CVE-2021-31682, https://github.com/3ndG4me/WebCTRL-OperatorLocale-Parameter-Reflected-XSS, https://www.automatedlogic.com/en/products-services/webctrl-building-automation-system/, http://packetstormsecurity.com/files/164707/WebCTRL-OEM-6.5-Cross-Site-Scripting.html
Nuclei Metadata: {'max-request': 1, 'shodan-query': 'html:"/_common/lvl5/dologin.jsp"', 'vendor': 'automatedlogic', 'product': 'webctrl'}
Platforms Tested:
2021
WebCTRL OEM 6.5 – ‘locale’ Reflected Cross-Site Scripting (XSS)
The login portal for the Automated Logic WebCTRL/WebCTRL OEM web application contains a vulnerability that allows for reflected XSS attacks due to the operatorlocale GET parameter not being sanitized. This issue works by passing in a basic XSS payload to a vulnerable GET parameter that is reflected in the output without sanitization.
Mitigation:
Sanitize any user controlled input in both form fields and URL parameters to properly encode data so it is not rendered as arbitrary HTML/JavaScript.