CVE-2023-40221

Published on: Not Yet Published

Last Modified on: 09/19/2023 03:37:00 AM UTC

CVE-2023-40221 - advisory for ICSA-23-250-03

Source: Mitre Source: NIST CVE.ORG Print: PDF PDF

Certain versions of MODULYS GP MOD3GP-SY-120K from Socomec contain the following vulnerability:

** UNSUPPPORTED WHEN ASSIGNED ** The absence of filters when loading some sections in the web application of the vulnerable device allows potential attackers to inject malicious code that will be interpreted when a legitimate user accesses the web section (MAIL SERVER) where the information is displayed. Injection can be done on parameter MAIL_RCV. When a legitimate user attempts to review NOTIFICATION/MAIL SERVER, the injected code will be executed.

  • CVE-2023-40221 has been assigned by URL Logo [email protected] to track the vulnerability
  • Affected Vendor/Software: URL Logo Socomec - MODULYS GP (MOD3GP-SY-120K) version = v01.12.10

CVE References

Description Tags Link
Socomec MOD3GP-SY-120K | CISA www.cisa.gov
text/html
URL Logo MISC www.cisa.gov/news-events/ics-advisories/icsa-23-250-03

Known Affected Software

Vendor Product Version
Socomec MODULYS_GP_MOD3GP-SY-120K= v01.12.10
© CVE.report 2023 Twitter Nitter Twitter Viewer |

Use of this information constitutes acceptance for use in an AS IS condition. There are NO warranties, implied or otherwise, with regard to this information or its use. Any use of this information is at the user's risk. It is the responsibility of user to evaluate the accuracy, completeness or usefulness of any information, opinion, advice or other content. EACH USER WILL BE SOLELY RESPONSIBLE FOR ANY consequences of his or her direct or indirect use of this web site. ALL WARRANTIES OF ANY KIND ARE EXPRESSLY DISCLAIMED. This site will NOT BE LIABLE FOR ANY DIRECT, INDIRECT or any other kind of loss.

CVE, CWE, and OVAL are registred trademarks of The MITRE Corporation and the authoritative source of CVE content is MITRE's CVE web site. This site includes MITRE data granted under the following license.

CVE.report and Source URL Uptime Status status.cve.report