Vendor description
"Siemens is a technology company focused on industry, infrastructure, transport, and healthcare. From more resource-efficient factories, resilient supply chains, and smarter buildings and grids, to cleaner and more comfortable transportation as well as advanced healthcare, we create technology with purpose adding real value for customers. By combining the real and the digital worlds, we empower our customers to transform their industries and markets, helping them to transform the everyday for billions of people."
"SINEMA Remote Connect is the management platform for remote networks. It is a server application that enables the simple management of tunnel connections (VPN) between headquarters, service technicians, and installed machines or plants."
Source: https://www.siemens.com
Business recommendation
The vendor provides a patch which should be installed immediately.
Vulnerability overview/description
1) Reflected Cross Site Scripting (CVE-2022-29034)
The application contains a reflected cross-site-scripting vulnerability that can be used to execute JavaScript code in the victim's browser.
Proof of concept
1) Reflected Cross Site Scripting (CVE-2022-29034)
The error occurs when setting the syslog server to an illegal IP address. An error message will pop up and will reflect the supplied IP address. However, the popup message does not use the proper JQuery method, and thus allows to inject JavaScript code. Note that dots can not be used in the JavaScript payload, as they will get filtered by the IP parser that runs beforehand. This was circumvented by supplying the JavaScript code in base64.
Following request can be used to trigger the XSS:
POST /services/syslog_client_settings HTTP/1.1
Host: $host
Cookie: sessionid=708xmctjzk39og596jp4q4r1udfom4l5;
csrftoken=sP8NzwJozla1k18xrRzsXiY0zq16IyBddtlDA1C5BC1Orf0oGcqUPr2bpUv1VGLu
Content-Length: 153
X-Requested-With: XMLHttpRequest
X-Csrftoken: U5AQMbPh3JTcdfdBkgIvaLtoitpS7jUVFJNGNGIY50KZkt5szBzX2Uxz8XTNkr4c
Referer:
Vulnerable / tested versions
The following version has been tested and found to be vulnerable:
* V3.0.1.0-01.01.00.02