First published: Fri Apr 02 2021(Updated: )
Softing AG OPC Toolbox through 4.10.1.13035 allows /en/diag_values.html Stored XSS via the ITEMLISTVALUES##ITEMID parameter, resulting in JavaScript payload injection into the trace file. This payload will then be triggered every time an authenticated user browses the page containing it.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Softing Opc Toolbox | <=4.10.1.13035 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID is CVE-2021-29661.
The title of this vulnerability is 'Softing AG OPC Toolbox through 4.10.1.13035 allows /en/diag_values.html Stored XSS via the ITEMLISTV...'.
The severity rating of CVE-2021-29661 is medium (5.4).
CVE-2021-29661 allows for Stored XSS through the ITEMLISTVALUES##ITEMID parameter, enabling injection of a JavaScript payload into the trace file.
To mitigate the risk of CVE-2021-29661, it is recommended to update Softing AG OPC Toolbox to version 4.10.1.13035 or later.