First published: Thu Jan 09 2014(Updated: )
Multiple cross-site scripting (XSS) vulnerabilities in Seagate BlackArmor NAS 220 devices with firmware sg2000-2000.1331 allow remote attackers to inject arbitrary web script or HTML via the (1) fullname parameter to admin/access_control_user_edit.php or (2) workname parameter to admin/network_workgroup_domain.php.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Seagate BlackArmor NAS 220 | =sg2000-2000.1331 | |
Seagate BlackArmor NAS | =st320005lsa10g-rk | |
Seagate BlackArmor NAS | =st340005lsa10g-rk | |
Seagate BlackArmor NAS | =stav6000100 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2013-6923 is classified as a high severity vulnerability due to its ability to allow remote code execution via XSS.
To address CVE-2013-6923, users should update the firmware of their Seagate BlackArmor NAS 220 devices to the latest version provided by Seagate.
CVE-2013-6923 affects Seagate BlackArmor NAS 220 devices with firmware version sg2000-2000.1331.
CVE-2013-6923 can facilitate cross-site scripting (XSS) attacks by allowing attackers to inject arbitrary web scripts into the device.
The vulnerable parameters in CVE-2013-6923 are the fullname parameter to admin/access_control_user_edit.php and the workname parameter to admin/network_workgroup_edit.php.