CVE-2024-6516
Cross Site Scripting XSS
Severity Score
9.3
*CVSS v4
Exploit Likelihood
*EPSS
Affected Versions
*CPE
Public Exploits
4
*Multiple Sources
Exploited in Wild
-
*KEV
Decision
Track*
*SSVC
Descriptions
Cross Site Scripting vulnerabilities where found providing a potential for malicious scripts to be injected into a client browser. Affected products: ABB ASPECT - Enterprise v3.08.02; NEXUS Series v3.08.02; MATRIX Series v3.08.02
ABB Cylon Aspect version 3.08.02 suffers from an authenticated blind command injection vulnerability. Input passed to several POST parameters is not properly sanitized when writing files, allowing attackers to execute arbitrary shell commands on the system. There is also an off-by-one error in array access that could lead to undefined behavior and potential denial of service.
*Credits:
ABB likes to thank Gjoko Krstikj, Zero Science Lab, for reporting the vulnerabilities in responsible disclosure
CVSS Scores
Attack Vector
Attack Complexity
Attack Requirements
Privileges Required
User Interaction
System
Vulnerable | Subsequent
Confidentiality
Integrity
Availability
Attack Vector
Attack Complexity
Attack Requirements
Privileges Required
User Interaction
System
Vulnerable | Subsequent
Confidentiality
Integrity
Availability
Attack Vector
Attack Complexity
Privileges Required
User Interaction
Scope
Confidentiality
Integrity
Availability
Attack Vector
Attack Complexity
Authentication
Confidentiality
Integrity
Availability
* Common Vulnerability Scoring System
SSVC
- Decision:Track*
Exploitation
Automatable
Tech. Impact
* Organization's Worst-case Scenario
Timeline
- 2024-07-04 CVE Reserved
- 2024-12-05 CVE Published
- 2024-12-05 CVE Updated
- 2024-12-24 First Exploit
- 2025-04-06 EPSS Updated
- ---------- Exploited in Wild
- ---------- KEV Due Date
CWE
- CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
CAPEC
References (5)
URL | Tag | Source |
---|---|---|
https://search.abb.com/library/Download.aspx?DocumentID=9AKK108469A7497&LanguageCode=en&DocumentPartId=&Action=Launch |
URL | Date | SRC |
---|---|---|
https://packetstorm.news/files/id/183448 | 2025-01-09 | |
https://packetstorm.news/files/id/183461 | 2025-01-10 | |
https://packetstorm.news/files/id/183462 | 2025-01-10 | |
https://packetstorm.news/files/id/183295 | 2024-12-24 |
URL | Date | SRC |
---|
URL | Date | SRC |
---|
Affected Vendors, Products, and Versions
Vendor | Product | Version | Other | Status | ||||||
---|---|---|---|---|---|---|---|---|---|---|
Vendor | Product | Version | Other | Status | <-- --> | Vendor | Product | Version | Other | Status |
ABB Search vendor "ABB" | ASPECT-Enterprise Search vendor "ABB" for product "ASPECT-Enterprise" | <= 3.08.01 Search vendor "ABB" for product "ASPECT-Enterprise" and version " <= 3.08.01" | en |
Affected
| ||||||
ABB Search vendor "ABB" | NEXUS Series Search vendor "ABB" for product "NEXUS Series" | <= 3.08.01 Search vendor "ABB" for product "NEXUS Series" and version " <= 3.08.01" | en |
Affected
| ||||||
ABB Search vendor "ABB" | MATRIX Series Search vendor "ABB" for product "MATRIX Series" | <= 3.08.01 Search vendor "ABB" for product "MATRIX Series" and version " <= 3.08.01" | en |
Affected
|