The web interface of Gira Giersiepen Gira KNX/IP-Router 3.1.3683.0 and 3.3.8.0 responds with a "404 - Not Found" status code if a path is accessed that does not exist. However, the value of the path is reflected in the response. As the application will reflect the supplied path without context-sensitive HTML encoding, it is vulnerable to reflective cross-site scripting (XSS).
References
Link | Resource |
---|---|
https://www.syss.de/en/responsible-disclosure-policy | Not Applicable |
https://www.syss.de/fileadmin/dokumente/Publikationen/Advisories/SYSS-2023-016.txt | Exploit Third Party Advisory |
https://www.syss.de/en/responsible-disclosure-policy | Not Applicable |
https://www.syss.de/fileadmin/dokumente/Publikationen/Advisories/SYSS-2023-016.txt | Exploit Third Party Advisory |
Configurations
Configuration 1 (hide)
AND |
|
History
No history.
Information
Published : 2023-06-30 14:15
Updated : 2024-11-21 08:05
NVD link : CVE-2023-33276
Mitre link : CVE-2023-33276
CVE.ORG link : CVE-2023-33276
JSON object : View
Products Affected
gira
- knx_ip_router_firmware
- knx_ip_router
CWE
CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')