Description
ETAP Safety Manager 1.0.0.32 contains a cross-site scripting vulnerability in the 'action' GET parameter that allows unauthenticated attackers to inject malicious HTML and JavaScript. Attackers can craft specially formed requests to execute arbitrary scripts in victim browser sessions, potentially stealing credentials or performing unauthorized actions.
Problem types
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
Product status
Credits
LiquidWorm as Gjoko Krstic of Zero Science Lab
References
www.zeroscience.mk/en/vulnerabilities/ZSL-2022-5711.php (Zero Science Lab Disclosure (ZSL-2022-5711))
packetstormsecurity.com/files/168339/ (Packet Storm Security Exploit Entry)
exchange.xforce.ibmcloud.com/vulnerabilities/235743 (IBM X-Force Vulnerability Exchange)
cxsecurity.com/issue/WLB-2022090031 (CXSecurity Vulnerability Database)
www.etaplighting.com/ (ETAP Vendor Homepage)
www.vulncheck.com/...oss-site-scripting-via-action-parameter (VulnCheck Advisory: ETAP Safety Manager 1.0.0.32 Unauthenticated Reflected Cross-Site Scripting via Action Parameter)
Data based on CVE®. Copyright © 1999-2025, The MITRE Corporation. All rights reserved.