This is a summary of the AI-generated 10-question deep analysis. The full version (longer answers, follow-up Q&A, related CVEs) requires login. Read the full analysis β
Q1What is this vulnerability? (Essence + Consequences)
π¨ **Essence**: Stored XSS in OpenPLC ScadaBR. π **Consequences**: Attackers inject malicious scripts via `system_settings.shtm`. Victims executing these scripts face session hijacking, data theft, or defacement.β¦
π‘οΈ **Root Cause**: Lack of input validation/sanitization on the `system_settings.shtm` page. π **Flaw**: Allows storage of executable JavaScript in system settings, triggering execution upon page load.β¦
π¦ **Affected Products**: OpenPLC ScadaBR. π₯οΈ **Versions**: Linux 0.9.1 & Windows 1.12.4. π **Vendor**: n/a (Open Source). β οΈ Only these specific versions are confirmed vulnerable.
Q4What can hackers do? (Privileges/Data)
π΅οΈ **Actions**: Run arbitrary JavaScript in victim's browser. πΎ **Data**: Steal cookies, session tokens, or sensitive SCADA data. π **Privileges**: Execute actions as the logged-in user.β¦
π **Auth**: Likely requires access to `system_settings.shtm`. βοΈ **Config**: Needs ability to modify system settings. π **Threshold**: Medium. If admin access is compromised, exploitation is trivial.β¦
π₯ **Exp**: Video PoC available at `youtu.be/Xh6LPCiLMa8`. π’ **Status**: Publicly demonstrated. π **Wild Exp**: Forum discussions confirm awareness. β οΈ Active exploitation risk is real.
Q7How to self-check? (Features/Scanning)
π **Check**: Scan for `system_settings.shtm` endpoint. π§ͺ **Test**: Attempt to inject `<script>` tags into settings fields. π‘ **Scan**: Look for OpenPLC ScadaBR signatures. π Verify if input is sanitized before storage.
Q8Is it fixed officially? (Patch/Mitigation)
π οΈ **Patch**: Data does not list an official CVE patch. π **Published**: June 11, 2021. π **Status**: Users must check vendor forums or update to newer, unlisted versions.β¦
π₯ **Urgency**: HIGH. π **Context**: Industrial systems are high-value targets. π **Risk**: Stored XSS can lead to full system compromise. π¨ **Action**: Patch immediately or apply strict network segmentation.β¦