// For flags

CVE-2023-46344

Solar-Log 200 PM+ 3.6.0 Cross Site Scripting

Severity Score

5.4
*CVSS v3.1

Exploit Likelihood

*EPSS

Affected Versions

*CPE

Public Exploits

2
*Multiple Sources

Exploited in Wild

-
*KEV

Decision

Attend
*SSVC
Descriptions

A vulnerability in Solar-Log Base 15 Firmware 6.0.1 Build 161, and possibly other Solar-Log Base products, allows an attacker to escalate their privileges by exploiting a stored cross-site scripting (XSS) vulnerability in the switch group function under /#ilang=DE&b=c_smartenergy_swgroups in the web portal. The vulnerability can be exploited to gain the rights of an installer or PM, which can then be used to gain administrative access to the web portal and execute further attacks.

Una vulnerabilidad en Solar-Log Base 15 Firmware 6.0.1 Build 161, y posiblemente en otros productos Solar-Log Base, permite a un atacante escalar sus privilegios explotando una vulnerabilidad de cross-site scripting (XSS) almacenada en la función de grupo de conmutadores en / #ilang=DE&b=c_smartenergy_swgroups en el portal web. La vulnerabilidad se puede aprovechar para obtener los derechos de un instalador o PM, que luego se puede utilizar para obtener acceso administrativo al portal web y ejecutar más ataques.

A vulnerability in Solar-Log Base 15 Firmware 6.0.1 Build 161, and possibly other Solar-Log Base products, allows an attacker to escalate their privileges by exploiting a stored cross-site scripting (XSS) vulnerability in the switch group function under /#ilang=DE&b=c_smartenergy_swgroups in the web portal. The vulnerability can be exploited to gain the rights of an installer or PM, which can then be used to gain administrative access to the web portal and execute further attacks. NOTE: The vendor states that this vulnerability has been fixed with 3.0.0-60 11.10.2013 for SL 200, 500, 1000 / not existing for SL 250, 300, 1200, 2000, SL 50 Gateway, SL Base.

Solar-Log 200 PM+ version 3.6.0 suffers from a persistent cross site scripting vulnerability.

*Credits: N/A
CVSS Scores
Attack Vector
Network
Attack Complexity
Low
Privileges Required
Low
User Interaction
Required
Scope
Changed
Confidentiality
Low
Integrity
Low
Availability
None
* Common Vulnerability Scoring System
SSVC
  • Decision:Attend
Exploitation
Poc
Automatable
No
Tech. Impact
Total
* Organization's Worst-case Scenario
Timeline
  • 2023-10-23 CVE Reserved
  • 2023-12-28 First Exploit
  • 2024-02-02 CVE Published
  • 2024-11-11 CVE Updated
  • 2024-11-12 EPSS Updated
  • ---------- Exploited in Wild
  • ---------- KEV Due Date
CWE
  • CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
CAPEC
Affected Vendors, Products, and Versions
Vendor Product Version Other Status
Vendor Product Version Other Status <-- --> Vendor Product Version Other Status
Solar-log
Search vendor "Solar-log"
2000 Pm\+ Firmware
Search vendor "Solar-log" for product "2000 Pm\+ Firmware"
15.10.2019
Search vendor "Solar-log" for product "2000 Pm\+ Firmware" and version "15.10.2019"
-
Affected
in Solar-log
Search vendor "Solar-log"
2000 Pm\+
Search vendor "Solar-log" for product "2000 Pm\+"
--
Safe