Article No° | Product Name | Affected Version(s) |
---|---|---|
FTP Data Station 3 | < 1.29 | |
Motherbox 3 | < 1.48 | |
pure.box 3 | < 1.83 | |
pure.box 3 Serial | < 1.83 | |
pure.box 3 Serial / USB | < 1.83 | |
pure.box 3 USB | < 1.83 | |
USB-Server Industry Isochron | < 2.21 |
Multiple W&T devices are shipped with a jQuery version with a known XSS vulnerability.
jQuery before 1.9.0 is vulnerable to Cross-site Scripting (XSS) attacks. The jQuery(strInput) function does not differentiate selectors from HTML in a reliable fashion. In vulnerable versions, jQuery determined whether the input was HTML by looking for the '<' character anywhere in the string, giving attackers more flexibility when attempting to construct a malicious payload. In fixed versions, jQuery only deems the input to be HTML if it explicitly starts with the '<' character, limiting exploitability only to attackers who can control the beginning of a string, which is far less common.
Multiple W&T Products are prone to an XSS attack. An autenticated remote attacker can execute arbitrary web scripts or HTML via crafted payload injected into fields on the configuration webpage.
Remediation
Update the affected devices to the following firmware:
CERT@VDE coordinated with Wiesemann & Theis