WEMS Enterprise Manager 2.58 Cross Site Scripting

WEMS Enterprise Manager version 2.58 suffers from a cross site scripting vulnerability.

MD5 | fd26e913be2f2993ba411b392e5e811e

WEMS Enterprise Manager 2.58 (email) Reflected XSS

Vendor: WEMS Limited
Product web page: https://www.wems.co.uk
Affected version: 2.58.8903

Summary: WEMS Enterprise Manager is a centralised management and monitoring
system for many WEMS equipped sites. It retrieves and stores data to enable
energy analysis at an enterprise wide level. It is designed to give global
visibility of the key areas that affect a buildings' environmental and energy
performance using site data collected via WEMS Site Managers or Niagara compatible

Desc: Input passed to the GET parameter 'email' is not properly sanitised before
being returned to the user. This can be exploited to execute arbitrary HTML code
in a user's browser session in context of an affected site.

Tested on: Linux

Vulnerability discovered by Gjoko 'LiquidWorm' Krstic

Advisory ID: ZSL-2019-5551
Advisory URL: https://www.zeroscience.mk/en/vulnerabilities/ZSL-2019-5551.php



Related Posts