First published: Wed Dec 22 2021(Updated: )
DIAEnergie Version 1.7.5 and prior is vulnerable to stored cross-site scripting when an unauthenticated user injects arbitrary code into the parameter “name” of the script “DIAE_HandlerAlarmGroup.ashx”.
Credit: ics-cert@hq.dhs.gov
Affected Software | Affected Version | How to fix |
---|---|---|
Deltaww Diaenergie | <=1.7.5 | |
Delta Electronics DIAEnergie | <1.9 | 1.9 |
Delta Electronics has released an updated version of DIAEnergie and recommends users install v1.8.0 and later on all affected systems.
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2021-44471 is a vulnerability in DIAEnergie version 1.7.5 and prior, which allows an unauthenticated user to inject arbitrary code into the 'name' parameter of the 'DIAE_HandlerAlarmGroup.ashx' script, leading to stored cross-site scripting (XSS).
The severity of CVE-2021-44471 is high, with a CVSS severity score of 6.1.
CVE-2021-44471 affects DIAEnergie version 1.7.5 and prior by allowing an unauthenticated user to inject arbitrary code into the 'name' parameter of the 'DIAE_HandlerAlarmGroup.ashx' script, which can lead to stored cross-site scripting (XSS) attacks.
To fix CVE-2021-44471, it is recommended to update DIAEnergie to a version that is not affected by this vulnerability.
You can find more information about CVE-2021-44471 at the following reference: https://www.cisa.gov/uscert/ics/advisories/icsa-21-238-03