Vulnerabilites related to planex - cs-qr22
var-202409-0992
Vulnerability from variot
Cross-site scripting vulnerability exists in the web management page of PLANEX COMMUNICATIONS network cameras. If a logged-in user accesses a specific file, an arbitrary script may be executed on the web browser of the user. None
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202409-0992", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "cs-qr220", "scope": "eq", "trust": 1.0, "vendor": "planex", "version": "*" }, { "model": "cs-qr20", "scope": "eq", "trust": 1.0, "vendor": "planex", "version": "*" }, { "model": "cs-qr300", "scope": "eq", "trust": 1.0, "vendor": "planex", "version": "*" }, { "model": "cs-qr22", "scope": "eq", "trust": 1.0, "vendor": "planex", "version": "*" }, { "model": "cs-qr10", "scope": "eq", "trust": 1.0, "vendor": "planex", "version": "*" }, { "model": "cs-qr10", "scope": null, "trust": 0.8, "vendor": "\u30d7\u30e9\u30cd\u30c3\u30af\u30b9\u30b3\u30df\u30e5\u30cb\u30b1\u30fc\u30b7\u30e7\u30f3\u30ba\u682a\u5f0f\u4f1a\u793e", "version": null }, { "model": "cs-qr300", "scope": null, "trust": 0.8, "vendor": "\u30d7\u30e9\u30cd\u30c3\u30af\u30b9\u30b3\u30df\u30e5\u30cb\u30b1\u30fc\u30b7\u30e7\u30f3\u30ba\u682a\u5f0f\u4f1a\u793e", "version": null }, { "model": "cs-qr22", "scope": null, "trust": 0.8, "vendor": "\u30d7\u30e9\u30cd\u30c3\u30af\u30b9\u30b3\u30df\u30e5\u30cb\u30b1\u30fc\u30b7\u30e7\u30f3\u30ba\u682a\u5f0f\u4f1a\u793e", "version": null }, { "model": "mzk-dp300n", "scope": "lte", "trust": 0.8, "vendor": "\u30d7\u30e9\u30cd\u30c3\u30af\u30b9\u30b3\u30df\u30e5\u30cb\u30b1\u30fc\u30b7\u30e7\u30f3\u30ba\u682a\u5f0f\u4f1a\u793e", "version": "firmware 1.04 and earlier (cve-2024-45372)" }, { "model": "cs-qr20", "scope": null, "trust": 0.8, "vendor": "\u30d7\u30e9\u30cd\u30c3\u30af\u30b9\u30b3\u30df\u30e5\u30cb\u30b1\u30fc\u30b7\u30e7\u30f3\u30ba\u682a\u5f0f\u4f1a\u793e", "version": null }, { "model": "cs-qr220", "scope": null, "trust": 0.8, "vendor": "\u30d7\u30e9\u30cd\u30c3\u30af\u30b9\u30b3\u30df\u30e5\u30cb\u30b1\u30fc\u30b7\u30e7\u30f3\u30ba\u682a\u5f0f\u4f1a\u793e", "version": null } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2024-000101" }, { "db": "NVD", "id": "CVE-2024-45836" } ] }, "cve": "CVE-2024-45836", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "nvd@nist.gov", "availabilityImpact": "NONE", "baseScore": 6.1, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "exploitabilityScore": 2.8, "id": "CVE-2024-45836", "impactScore": 2.7, "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "CHANGED", "trust": 1.0, "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "IPA", "availabilityImpact": "None", "baseScore": 6.1, "baseSeverity": "Medium", "confidentialityImpact": "Low", "exploitabilityScore": null, "id": "JVNDB-2024-000101", "impactScore": null, "integrityImpact": "Low", "privilegesRequired": "None", "scope": "Changed", "trust": 0.8, "userInteraction": "Required", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", "version": "3.0" } ], "severity": [ { "author": "nvd@nist.gov", "id": "CVE-2024-45836", "trust": 1.0, "value": "MEDIUM" }, { "author": "IPA", "id": "JVNDB-2024-000101", "trust": 0.8, "value": "Medium" } ] } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2024-000101" }, { "db": "NVD", "id": "CVE-2024-45836" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Cross-site scripting vulnerability exists in the web management page of PLANEX COMMUNICATIONS network cameras. If a logged-in user accesses a specific file, an arbitrary script may be executed on the web browser of the user. None", "sources": [ { "db": "NVD", "id": "CVE-2024-45836" }, { "db": "JVNDB", "id": "JVNDB-2024-000101" } ], "trust": 1.62 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "JVN", "id": "JVN81966868", "trust": 1.8 }, { "db": "NVD", "id": "CVE-2024-45836", "trust": 1.8 }, { "db": "JVNDB", "id": "JVNDB-2024-000101", "trust": 0.8 } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2024-000101" }, { "db": "NVD", "id": "CVE-2024-45836" } ] }, "id": "VAR-202409-0992", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VARIoT devices database", "id": null } ], "trust": 0.44444445 }, "last_update_date": "2024-10-04T02:28:39.604000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "Planex Communications Inc. \u00a0 announcement page", "trust": 0.8, "url": "https://www.planex.co.jp/support/download/mzk-dp300n/" } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2024-000101" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-79", "trust": 1.0 }, { "problemtype": "Cross-site scripting (CWE-79) [IPA evaluation ]", "trust": 0.8 }, { "problemtype": " Cross-site request forgery (CWE-352) [IPA evaluation ]", "trust": 0.8 } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2024-000101" }, { "db": "NVD", "id": "CVE-2024-45836" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 1.0, "url": "https://jvn.jp/en/jp/jvn81966868/" }, { "trust": 0.8, "url": "https://jvn.jp/jp/jvn81966868/index.html" } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2024-000101" }, { "db": "NVD", "id": "CVE-2024-45836" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "JVNDB", "id": "JVNDB-2024-000101" }, { "db": "NVD", "id": "CVE-2024-45836" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2024-09-24T00:00:00", "db": "JVNDB", "id": "JVNDB-2024-000101" }, { "date": "2024-09-26T05:15:12.190000", "db": "NVD", "id": "CVE-2024-45836" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2024-09-24T03:10:00", "db": "JVNDB", "id": "JVNDB-2024-000101" }, { "date": "2024-10-03T00:35:53.797000", "db": "NVD", "id": "CVE-2024-45836" } ] }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Multiple vulnerabilities in Planex network equipment", "sources": [ { "db": "JVNDB", "id": "JVNDB-2024-000101" } ], "trust": 0.8 } }
cve-2024-45836
Vulnerability from cvelistv5
Published
2024-09-26 04:07
Modified
2024-09-26 13:37
Severity ?
EPSS score ?
Summary
Cross-site scripting vulnerability exists in the web management page of PLANEX COMMUNICATIONS network cameras. If a logged-in user accesses a specific file, an arbitrary script may be executed on the web browser of the user.
References
▼ | URL | Tags |
---|---|---|
https://jvn.jp/en/jp/JVN81966868/ |
Impacted products
Vendor | Product | Version | ||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
▼ | PLANEX COMMUNICATIONS INC. | CS-QR10 |
Version: all firmware versions |
|||||||||||||||||||||
|
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2024-45836", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-09-26T13:37:11.206613Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-09-26T13:37:20.761Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "product": "CS-QR10", "vendor": "PLANEX COMMUNICATIONS INC.", "versions": [ { "status": "affected", "version": "all firmware versions" } ] }, { "product": "CS-QR20", "vendor": "PLANEX COMMUNICATIONS INC.", "versions": [ { "status": "affected", "version": "all firmware versions" } ] }, { "product": "CS-QR22", "vendor": "PLANEX COMMUNICATIONS INC.", "versions": [ { "status": "affected", "version": "all firmware versions" } ] }, { "product": "CS-QR220", "vendor": "PLANEX COMMUNICATIONS INC.", "versions": [ { "status": "affected", "version": "all firmware versions" } ] }, { "product": "CS-QR300", "vendor": "PLANEX COMMUNICATIONS INC.", "versions": [ { "status": "affected", "version": "all firmware versions" } ] } ], "descriptions": [ { "lang": "en", "value": "Cross-site scripting vulnerability exists in the web management page of PLANEX COMMUNICATIONS network cameras. If a logged-in user accesses a specific file, an arbitrary script may be executed on the web browser of the user." } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-79", "description": "Cross-site scripting (XSS)", "lang": "en-US", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-09-26T04:07:37.035Z", "orgId": "ede6fdc4-6654-4307-a26d-3331c018e2ce", "shortName": "jpcert" }, "references": [ { "url": "https://jvn.jp/en/jp/JVN81966868/" } ] } }, "cveMetadata": { "assignerOrgId": "ede6fdc4-6654-4307-a26d-3331c018e2ce", "assignerShortName": "jpcert", "cveId": "CVE-2024-45836", "datePublished": "2024-09-26T04:07:37.035Z", "dateReserved": "2024-09-10T06:57:27.511Z", "dateUpdated": "2024-09-26T13:37:20.761Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
Vulnerability from fkie_nvd
Published
2024-09-26 05:15
Modified
2024-10-03 00:35
Severity ?
Summary
Cross-site scripting vulnerability exists in the web management page of PLANEX COMMUNICATIONS network cameras. If a logged-in user accesses a specific file, an arbitrary script may be executed on the web browser of the user.
References
▼ | URL | Tags | |
---|---|---|---|
vultures@jpcert.or.jp | https://jvn.jp/en/jp/JVN81966868/ | Third Party Advisory |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
planex | cs-qr10_firmware | * | |
planex | cs-qr10 | - | |
planex | cs-qr20_firmware | * | |
planex | cs-qr20 | - | |
planex | cs-qr22_firmware | * | |
planex | cs-qr22 | - | |
planex | cs-qr220_firmware | * | |
planex | cs-qr220 | - | |
planex | cs-qr300_firmware | * | |
planex | cs-qr300 | - |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:planex:cs-qr10_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "7FEF99E1-D1F1-472E-B4FB-C5C0BEA5903C", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:planex:cs-qr10:-:*:*:*:*:*:*:*", "matchCriteriaId": "A29EFF41-EBB0-40BB-B902-1E06991F241C", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:planex:cs-qr20_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "48F417C4-00BF-4DD6-B13F-5CE3689CACC3", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:planex:cs-qr20:-:*:*:*:*:*:*:*", "matchCriteriaId": "6EFA7189-C7EF-4B2C-A395-C65227DC0E68", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:planex:cs-qr22_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "1F451BA4-F787-4A91-8159-B10CEB250F49", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:planex:cs-qr22:-:*:*:*:*:*:*:*", "matchCriteriaId": "22EF5100-73AF-4ECE-A872-0BC8DA6FAF2B", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:planex:cs-qr220_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "1B69D307-B421-4F84-917C-410A6847F522", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:planex:cs-qr220:-:*:*:*:*:*:*:*", "matchCriteriaId": "6F63CDED-D6F4-438D-A2CC-A51444938EAC", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:planex:cs-qr300_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "F9F555D9-F3D2-4588-ACD8-B5E414A3594C", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:planex:cs-qr300:-:*:*:*:*:*:*:*", "matchCriteriaId": "F8926972-BCAF-4FDA-82CF-7AFC5EFDB410", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Cross-site scripting vulnerability exists in the web management page of PLANEX COMMUNICATIONS network cameras. If a logged-in user accesses a specific file, an arbitrary script may be executed on the web browser of the user." }, { "lang": "es", "value": "Existe una vulnerabilidad de Cross Site Scripting en la p\u00e1gina de administraci\u00f3n web de las c\u00e1maras de red PLANEX COMMUNICATIONS. Si un usuario conectado accede a un archivo espec\u00edfico, se puede ejecutar una secuencia de comandos arbitraria en el navegador web del usuario." } ], "id": "CVE-2024-45836", "lastModified": "2024-10-03T00:35:53.797", "metrics": { "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.1, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 2.7, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2024-09-26T05:15:12.190", "references": [ { "source": "vultures@jpcert.or.jp", "tags": [ "Third Party Advisory" ], "url": "https://jvn.jp/en/jp/JVN81966868/" } ], "sourceIdentifier": "vultures@jpcert.or.jp", "vulnStatus": "Analyzed", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-79" } ], "source": "vultures@jpcert.or.jp", "type": "Secondary" }, { "description": [ { "lang": "en", "value": "CWE-79" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }