CVE-2021-23860 (GCVE-0-2021-23860)
Vulnerability from cvelistv5
Published
2021-12-08 21:17
Modified
2024-09-17 03:52
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- CWE-79 - Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
Summary
An error in a page handler of the VRM may lead to a reflected cross site scripting (XSS) in the web-based interface. To exploit this vulnerability an attack must be able to modify the HTTP header that is sent. This issue also affects installations of the DIVAR IP and BVMS with VRM installed.
References
Impacted products
Vendor | Product | Version | ||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
► | Bosch | BVMS |
Version: unspecified < Version: 11.0 < 11.0.0 Version: 10.0 < 10.0.2 Version: 10.1 < 10.1.1 |
|||||||||||||||||||||
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T19:14:09.832Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://psirt.bosch.com/security-advisories/bosch-sa-043434-bt.html" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "BVMS", "vendor": "Bosch", "versions": [ { "lessThanOrEqual": "9.0.0", "status": "affected", "version": "unspecified", "versionType": "custom" }, { "lessThan": "11.0.0", "status": "affected", "version": "11.0", "versionType": "custom" }, { "lessThan": "10.0.2", "status": "affected", "version": "10.0", "versionType": "custom" }, { "lessThan": "10.1.1", "status": "affected", "version": "10.1", "versionType": "custom" } ] }, { "product": "DIVAR IP 7000 R2", "vendor": "Bosch", "versions": [ { "status": "affected", "version": "all" } ] }, { "product": "DIVAR IP all-in-one 5000", "vendor": "Bosch", "versions": [ { "status": "affected", "version": "all" } ] }, { "product": "DIVAR IP all-in-one 7000", "vendor": "Bosch", "versions": [ { "status": "affected", "version": "all" } ] }, { "product": "VRM", "vendor": "Bosch", "versions": [ { "lessThanOrEqual": "3.81", "status": "affected", "version": "unspecified", "versionType": "custom" }, { "lessThanOrEqual": "4.00.0070", "status": "affected", "version": "4.0", "versionType": "custom" }, { "lessThanOrEqual": "3.83.0021", "status": "affected", "version": "3.83", "versionType": "custom" }, { "lessThanOrEqual": "3.82.0057", "status": "affected", "version": "3.82", "versionType": "custom" } ] } ], "datePublic": "2021-12-08T00:00:00", "descriptions": [ { "lang": "en", "value": "An error in a page handler of the VRM may lead to a reflected cross site scripting (XSS) in the web-based interface. To exploit this vulnerability an attack must be able to modify the HTTP header that is sent. This issue also affects installations of the DIVAR IP and BVMS with VRM installed." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 5, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-79", "description": "CWE-79 Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2021-12-08T21:17:28", "orgId": "c95f66b2-7e7c-41c5-8f09-6f86ec68659c", "shortName": "bosch" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "https://psirt.bosch.com/security-advisories/bosch-sa-043434-bt.html" } ], "source": { "advisory": "BOSCH-SA-043434-BT", "discovery": "UNKNOWN" }, "title": "Reflected Cross Site Scripting (XSS) vulnerability in Bosch VRM / BVMS", "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@bosch.com", "DATE_PUBLIC": "2021-12-08", "ID": "CVE-2021-23860", "STATE": "PUBLIC", "TITLE": "Reflected Cross Site Scripting (XSS) vulnerability in Bosch VRM / BVMS" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "BVMS", "version": { "version_data": [ { "version_affected": "\u003c", "version_name": "11.0", "version_value": "11.0.0" }, { "version_affected": "\u003c", "version_name": "10.0", "version_value": "10.0.2" }, { "version_affected": "\u003c", "version_name": "10.1", "version_value": "10.1.1" }, { "version_affected": "\u003c=", "version_value": "9.0.0" } ] } }, { "product_name": "DIVAR IP 7000 R2", "version": { "version_data": [ { "configuration": "using vulnerable BVMS version", "version_affected": "=", "version_value": "all" } ] } }, { "product_name": "DIVAR IP all-in-one 5000", "version": { "version_data": [ { "configuration": "using vulnerable BVMS or VRM version", "version_affected": "=", "version_value": "all" } ] } }, { "product_name": "DIVAR IP all-in-one 7000", "version": { "version_data": [ { "configuration": "using vulnerable BVMS or VRM version", "version_affected": "=", "version_value": "all" } ] } }, { "product_name": "VRM", "version": { "version_data": [ { "version_affected": "\u003c=", "version_name": "4.0", "version_value": "4.00.0070" }, { "version_affected": "\u003c=", "version_name": "3.83", "version_value": "3.83.0021" }, { "version_affected": "\u003c=", "version_name": "3.82", "version_value": "3.82.0057" }, { "version_affected": "\u003c=", "version_value": "3.81" } ] } } ] }, "vendor_name": "Bosch" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "An error in a page handler of the VRM may lead to a reflected cross site scripting (XSS) in the web-based interface. To exploit this vulnerability an attack must be able to modify the HTTP header that is sent. This issue also affects installations of the DIVAR IP and BVMS with VRM installed." } ] }, "impact": { "cvss": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 5, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L", "version": "3.1" } }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-79 Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)" } ] } ] }, "references": { "reference_data": [ { "name": "https://psirt.bosch.com/security-advisories/bosch-sa-043434-bt.html", "refsource": "CONFIRM", "url": "https://psirt.bosch.com/security-advisories/bosch-sa-043434-bt.html" } ] }, "source": { "advisory": "BOSCH-SA-043434-BT", "discovery": "UNKNOWN" } } } }, "cveMetadata": { "assignerOrgId": "c95f66b2-7e7c-41c5-8f09-6f86ec68659c", "assignerShortName": "bosch", "cveId": "CVE-2021-23860", "datePublished": "2021-12-08T21:17:28.106105Z", "dateReserved": "2021-01-12T00:00:00", "dateUpdated": "2024-09-17T03:52:42.674Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1", "vulnerability-lookup:meta": { "nvd": "{\"cve\":{\"id\":\"CVE-2021-23860\",\"sourceIdentifier\":\"psirt@bosch.com\",\"published\":\"2021-12-08T22:15:08.473\",\"lastModified\":\"2024-11-21T05:51:58.163\",\"vulnStatus\":\"Modified\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"An error in a page handler of the VRM may lead to a reflected cross site scripting (XSS) in the web-based interface. To exploit this vulnerability an attack must be able to modify the HTTP header that is sent. This issue also affects installations of the DIVAR IP and BVMS with VRM installed.\"},{\"lang\":\"es\",\"value\":\"Un error en un manejador de p\u00e1ginas del VRM puede conllevar a un ataque de tipo un cross site scripting (XSS) reflejado en la interfaz basada en la web. Para explotar esta vulnerabilidad un ataque debe ser capaz de modificar el encabezado HTTP que es enviado. Este problema tambi\u00e9n afecta a las instalaciones de DIVAR IP y BVMS con VRM instalado\"}],\"metrics\":{\"cvssMetricV31\":[{\"source\":\"psirt@bosch.com\",\"type\":\"Secondary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L\",\"baseScore\":5.0,\"baseSeverity\":\"MEDIUM\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"HIGH\",\"privilegesRequired\":\"NONE\",\"userInteraction\":\"REQUIRED\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"LOW\",\"integrityImpact\":\"LOW\",\"availabilityImpact\":\"LOW\"},\"exploitabilityScore\":1.6,\"impactScore\":3.4},{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N\",\"baseScore\":6.1,\"baseSeverity\":\"MEDIUM\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"NONE\",\"userInteraction\":\"REQUIRED\",\"scope\":\"CHANGED\",\"confidentialityImpact\":\"LOW\",\"integrityImpact\":\"LOW\",\"availabilityImpact\":\"NONE\"},\"exploitabilityScore\":2.8,\"impactScore\":2.7}],\"cvssMetricV2\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"2.0\",\"vectorString\":\"AV:N/AC:M/Au:N/C:N/I:P/A:N\",\"baseScore\":4.3,\"accessVector\":\"NETWORK\",\"accessComplexity\":\"MEDIUM\",\"authentication\":\"NONE\",\"confidentialityImpact\":\"NONE\",\"integrityImpact\":\"PARTIAL\",\"availabilityImpact\":\"NONE\"},\"baseSeverity\":\"MEDIUM\",\"exploitabilityScore\":8.6,\"impactScore\":2.9,\"acInsufInfo\":false,\"obtainAllPrivilege\":false,\"obtainUserPrivilege\":false,\"obtainOtherPrivilege\":false,\"userInteractionRequired\":true}]},\"weaknesses\":[{\"source\":\"psirt@bosch.com\",\"type\":\"Secondary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-79\"}]},{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-79\"}]}],\"configurations\":[{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:bosch:bosch_video_management_system:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"9.0\",\"matchCriteriaId\":\"0B9DD276-15C0-4942-8899-553F7C190320\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:bosch:bosch_video_management_system:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"10.0\",\"versionEndExcluding\":\"10.0.2\",\"matchCriteriaId\":\"989D5F9A-D223-4070-82AE-FA79E8B2572C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:bosch:bosch_video_management_system:10.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"57FA3EF2-6A7C-46FD-A758-92045A3A2DEE\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:bosch:bosch_video_management_system:11.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1FF22168-E2A2-47B8-B9BC-104FF1CFDF30\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:bosch:video_recording_manager:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"3.81\",\"matchCriteriaId\":\"D54B21E5-8C3E-423F-8E49-9F05B41D540B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:bosch:video_recording_manager:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"3.82\",\"versionEndIncluding\":\"3.82.0057\",\"matchCriteriaId\":\"31D1E38A-C0F8-421B-B837-3D2FBD132A18\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:bosch:video_recording_manager:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"3.83\",\"versionEndIncluding\":\"3.83.0021\",\"matchCriteriaId\":\"7171D63A-3A1A-4235-9317-009D7C85A93C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:bosch:video_recording_manager:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"4.0\",\"versionEndIncluding\":\"4.00.0070\",\"matchCriteriaId\":\"31572EBA-C58A-46E8-88EA-ADE04578E039\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:o:bosch:divar_ip_5000_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E2C1615D-2E5F-4D49-B937-05C81AB5414C\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:o:bosch:divar_ip_7000_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7CCD42BE-E4B7-43FC-95FB-C97704E5C268\"}]}]}],\"references\":[{\"url\":\"https://psirt.bosch.com/security-advisories/bosch-sa-043434-bt.html\",\"source\":\"psirt@bosch.com\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"https://psirt.bosch.com/security-advisories/bosch-sa-043434-bt.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Vendor Advisory\"]}]}}" } }
Loading…
Loading…
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.
Loading…
Loading…