var-201510-0193
Vulnerability from variot
Multiple cross-site scripting (XSS) vulnerabilities in the Wind Farm Portal application in Nordex Control 2 (NC2) SCADA 16 and earlier allow remote attackers to inject arbitrary web script or HTML via unspecified vectors. Nordex Control 2 is a web-based SCADA system for wind power plants. An attacker may leverage this issue to execute arbitrary script code in the browser of an unsuspecting user in the context of the affected site. This may allow the attacker to steal cookie-based authentication credentials and to launch other attacks. Nordex Control 2 (NC2) SCADA 16 and prior versions are vulnerable
Show details on source website{
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#",
"affected_products": {
"@id": "https://www.variotdbs.pl/ref/affected_products"
},
"configurations": {
"@id": "https://www.variotdbs.pl/ref/configurations"
},
"credits": {
"@id": "https://www.variotdbs.pl/ref/credits"
},
"cvss": {
"@id": "https://www.variotdbs.pl/ref/cvss/"
},
"description": {
"@id": "https://www.variotdbs.pl/ref/description/"
},
"exploit_availability": {
"@id": "https://www.variotdbs.pl/ref/exploit_availability/"
},
"external_ids": {
"@id": "https://www.variotdbs.pl/ref/external_ids/"
},
"iot": {
"@id": "https://www.variotdbs.pl/ref/iot/"
},
"iot_taxonomy": {
"@id": "https://www.variotdbs.pl/ref/iot_taxonomy/"
},
"patch": {
"@id": "https://www.variotdbs.pl/ref/patch/"
},
"problemtype_data": {
"@id": "https://www.variotdbs.pl/ref/problemtype_data/"
},
"references": {
"@id": "https://www.variotdbs.pl/ref/references/"
},
"sources": {
"@id": "https://www.variotdbs.pl/ref/sources/"
},
"sources_release_date": {
"@id": "https://www.variotdbs.pl/ref/sources_release_date/"
},
"sources_update_date": {
"@id": "https://www.variotdbs.pl/ref/sources_update_date/"
},
"threat_type": {
"@id": "https://www.variotdbs.pl/ref/threat_type/"
},
"title": {
"@id": "https://www.variotdbs.pl/ref/title/"
},
"type": {
"@id": "https://www.variotdbs.pl/ref/type/"
}
},
"@id": "https://www.variotdbs.pl/vuln/VAR-201510-0193",
"affected_products": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/affected_products#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
},
"@id": "https://www.variotdbs.pl/ref/sources"
}
},
"data": [
{
"model": "control 2 scada",
"scope": "lte",
"trust": 1.8,
"vendor": "nordex",
"version": "16"
},
{
"model": "se nordex control scada",
"scope": "eq",
"trust": 0.6,
"vendor": "nordex",
"version": "2\u003c=16"
},
{
"model": "control 2 scada",
"scope": "eq",
"trust": 0.6,
"vendor": "nordex",
"version": "16"
},
{
"model": "control scada",
"scope": "eq",
"trust": 0.3,
"vendor": "nordex",
"version": "216"
},
{
"model": "control scada",
"scope": "eq",
"trust": 0.3,
"vendor": "nordex",
"version": "215"
},
{
"model": null,
"scope": "eq",
"trust": 0.2,
"vendor": "nordex control 2 scada",
"version": "*"
}
],
"sources": [
{
"db": "IVD",
"id": "7c6016ce-2351-11e6-abef-000c29c66e3d"
},
{
"db": "CNVD",
"id": "CNVD-2015-06784"
},
{
"db": "BID",
"id": "77075"
},
{
"db": "JVNDB",
"id": "JVNDB-2015-005367"
},
{
"db": "CNNVD",
"id": "CNNVD-201510-325"
},
{
"db": "NVD",
"id": "CVE-2015-6477"
}
]
},
"configurations": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/configurations#",
"children": {
"@container": "@list"
},
"cpe_match": {
"@container": "@list"
},
"data": {
"@container": "@list"
},
"nodes": {
"@container": "@list"
}
},
"data": [
{
"CVE_data_version": "4.0",
"nodes": [
{
"cpe_match": [
{
"cpe22Uri": "cpe:/h:nordex:nordex_control_2_scada",
"vulnerable": true
}
],
"operator": "OR"
}
]
}
],
"sources": [
{
"db": "JVNDB",
"id": "JVNDB-2015-005367"
}
]
},
"credits": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/credits#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "Karn Ganeshen",
"sources": [
{
"db": "BID",
"id": "77075"
}
],
"trust": 0.3
},
"cve": "CVE-2015-6477",
"cvss": {
"@context": {
"cvssV2": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/cvssV2"
},
"cvssV3": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/"
},
"severity": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/cvss/severity#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/severity"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
},
"@id": "https://www.variotdbs.pl/ref/sources"
}
},
"data": [
{
"cvssV2": [
{
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"author": "nvd@nist.gov",
"availabilityImpact": "NONE",
"baseScore": 4.3,
"confidentialityImpact": "NONE",
"exploitabilityScore": 8.6,
"id": "CVE-2015-6477",
"impactScore": 2.9,
"integrityImpact": "PARTIAL",
"severity": "MEDIUM",
"trust": 1.9,
"vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
"version": "2.0"
},
{
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"author": "CNVD",
"availabilityImpact": "NONE",
"baseScore": 4.3,
"confidentialityImpact": "NONE",
"exploitabilityScore": 8.6,
"id": "CNVD-2015-06784",
"impactScore": 2.9,
"integrityImpact": "PARTIAL",
"severity": "MEDIUM",
"trust": 0.6,
"vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
"version": "2.0"
},
{
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"author": "IVD",
"availabilityImpact": "NONE",
"baseScore": 4.3,
"confidentialityImpact": "NONE",
"exploitabilityScore": 8.6,
"id": "7c6016ce-2351-11e6-abef-000c29c66e3d",
"impactScore": 2.9,
"integrityImpact": "PARTIAL",
"severity": "MEDIUM",
"trust": 0.2,
"vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
"version": "2.9 [IVD]"
},
{
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"author": "VULHUB",
"availabilityImpact": "NONE",
"baseScore": 4.3,
"confidentialityImpact": "NONE",
"exploitabilityScore": 8.6,
"id": "VHN-84438",
"impactScore": 2.9,
"integrityImpact": "PARTIAL",
"severity": "MEDIUM",
"trust": 0.1,
"vectorString": "AV:N/AC:M/AU:N/C:N/I:P/A:N",
"version": "2.0"
}
],
"cvssV3": [],
"severity": [
{
"author": "nvd@nist.gov",
"id": "CVE-2015-6477",
"trust": 1.0,
"value": "MEDIUM"
},
{
"author": "NVD",
"id": "CVE-2015-6477",
"trust": 0.8,
"value": "Medium"
},
{
"author": "CNVD",
"id": "CNVD-2015-06784",
"trust": 0.6,
"value": "MEDIUM"
},
{
"author": "CNNVD",
"id": "CNNVD-201510-325",
"trust": 0.6,
"value": "MEDIUM"
},
{
"author": "IVD",
"id": "7c6016ce-2351-11e6-abef-000c29c66e3d",
"trust": 0.2,
"value": "MEDIUM"
},
{
"author": "VULHUB",
"id": "VHN-84438",
"trust": 0.1,
"value": "MEDIUM"
},
{
"author": "VULMON",
"id": "CVE-2015-6477",
"trust": 0.1,
"value": "MEDIUM"
}
]
}
],
"sources": [
{
"db": "IVD",
"id": "7c6016ce-2351-11e6-abef-000c29c66e3d"
},
{
"db": "CNVD",
"id": "CNVD-2015-06784"
},
{
"db": "VULHUB",
"id": "VHN-84438"
},
{
"db": "VULMON",
"id": "CVE-2015-6477"
},
{
"db": "JVNDB",
"id": "JVNDB-2015-005367"
},
{
"db": "CNNVD",
"id": "CNNVD-201510-325"
},
{
"db": "NVD",
"id": "CVE-2015-6477"
}
]
},
"description": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/description#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "Multiple cross-site scripting (XSS) vulnerabilities in the Wind Farm Portal application in Nordex Control 2 (NC2) SCADA 16 and earlier allow remote attackers to inject arbitrary web script or HTML via unspecified vectors. Nordex Control 2 is a web-based SCADA system for wind power plants. \nAn attacker may leverage this issue to execute arbitrary script code in the browser of an unsuspecting user in the context of the affected site. This may allow the attacker to steal cookie-based authentication credentials and to launch other attacks. \nNordex Control 2 (NC2) SCADA 16 and prior versions are vulnerable",
"sources": [
{
"db": "NVD",
"id": "CVE-2015-6477"
},
{
"db": "JVNDB",
"id": "JVNDB-2015-005367"
},
{
"db": "CNVD",
"id": "CNVD-2015-06784"
},
{
"db": "BID",
"id": "77075"
},
{
"db": "IVD",
"id": "7c6016ce-2351-11e6-abef-000c29c66e3d"
},
{
"db": "VULHUB",
"id": "VHN-84438"
},
{
"db": "VULMON",
"id": "CVE-2015-6477"
}
],
"trust": 2.79
},
"exploit_availability": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/exploit_availability#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"reference": "https://www.scap.org.cn/vuln/vhn-84438",
"trust": 0.1,
"type": "unknown"
}
],
"sources": [
{
"db": "VULHUB",
"id": "VHN-84438"
}
]
},
"external_ids": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/external_ids#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"db": "NVD",
"id": "CVE-2015-6477",
"trust": 3.7
},
{
"db": "ICS CERT",
"id": "ICSA-15-286-01",
"trust": 3.5
},
{
"db": "PACKETSTORM",
"id": "135068",
"trust": 1.2
},
{
"db": "CNNVD",
"id": "CNNVD-201510-325",
"trust": 0.9
},
{
"db": "CNVD",
"id": "CNVD-2015-06784",
"trust": 0.8
},
{
"db": "JVNDB",
"id": "JVNDB-2015-005367",
"trust": 0.8
},
{
"db": "BID",
"id": "77075",
"trust": 0.4
},
{
"db": "IVD",
"id": "7C6016CE-2351-11E6-ABEF-000C29C66E3D",
"trust": 0.2
},
{
"db": "VULHUB",
"id": "VHN-84438",
"trust": 0.1
},
{
"db": "VULMON",
"id": "CVE-2015-6477",
"trust": 0.1
}
],
"sources": [
{
"db": "IVD",
"id": "7c6016ce-2351-11e6-abef-000c29c66e3d"
},
{
"db": "CNVD",
"id": "CNVD-2015-06784"
},
{
"db": "VULHUB",
"id": "VHN-84438"
},
{
"db": "VULMON",
"id": "CVE-2015-6477"
},
{
"db": "BID",
"id": "77075"
},
{
"db": "JVNDB",
"id": "JVNDB-2015-005367"
},
{
"db": "CNNVD",
"id": "CNNVD-201510-325"
},
{
"db": "NVD",
"id": "CVE-2015-6477"
}
]
},
"id": "VAR-201510-0193",
"iot": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/iot#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": true,
"sources": [
{
"db": "IVD",
"id": "7c6016ce-2351-11e6-abef-000c29c66e3d"
},
{
"db": "CNVD",
"id": "CNVD-2015-06784"
},
{
"db": "VULHUB",
"id": "VHN-84438"
}
],
"trust": 1.9
},
"iot_taxonomy": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/iot_taxonomy#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"category": [
"ICS"
],
"sub_category": null,
"trust": 0.8
}
],
"sources": [
{
"db": "IVD",
"id": "7c6016ce-2351-11e6-abef-000c29c66e3d"
},
{
"db": "CNVD",
"id": "CNVD-2015-06784"
}
]
},
"last_update_date": "2024-11-23T22:22:52.693000Z",
"patch": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/patch#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"title": "NORDEX CONTROL 2",
"trust": 0.8,
"url": "http://www.nordex-online.com/fileadmin/MEDIA/Sonstiges/Nordex_Control_2_EN.pdf"
},
{
"title": "Nordex NC2 has multiple patches for cross-site scripting vulnerabilities",
"trust": 0.6,
"url": "https://www.cnvd.org.cn/patchInfo/show/65559"
},
{
"title": "Nordex Control 2 Wind Farm Portal Fixes for application cross-site scripting vulnerabilities",
"trust": 0.6,
"url": "http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=58173"
},
{
"title": "Kenzer Templates [5170] [DEPRECATED]",
"trust": 0.1,
"url": "https://github.com/ARPSyndicate/kenzer-templates "
}
],
"sources": [
{
"db": "CNVD",
"id": "CNVD-2015-06784"
},
{
"db": "VULMON",
"id": "CVE-2015-6477"
},
{
"db": "JVNDB",
"id": "JVNDB-2015-005367"
},
{
"db": "CNNVD",
"id": "CNNVD-201510-325"
}
]
},
"problemtype_data": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/problemtype_data#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"problemtype": "CWE-79",
"trust": 1.9
}
],
"sources": [
{
"db": "VULHUB",
"id": "VHN-84438"
},
{
"db": "JVNDB",
"id": "JVNDB-2015-005367"
},
{
"db": "NVD",
"id": "CVE-2015-6477"
}
]
},
"references": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/references#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"trust": 3.5,
"url": "https://ics-cert.us-cert.gov/advisories/icsa-15-286-01"
},
{
"trust": 1.3,
"url": "http://packetstormsecurity.com/files/135068/nordex-control-2-nc2-scada-16-cross-site-scripting.html"
},
{
"trust": 1.2,
"url": "http://seclists.org/fulldisclosure/2015/dec/117"
},
{
"trust": 0.8,
"url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2015-6477"
},
{
"trust": 0.8,
"url": "http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2015-6477"
},
{
"trust": 0.3,
"url": "http://www.nordex-online.com/fileadmin/media/sonstiges/nordex_control_2_en.pdf"
},
{
"trust": 0.1,
"url": "https://cwe.mitre.org/data/definitions/79.html"
},
{
"trust": 0.1,
"url": "https://nvd.nist.gov"
},
{
"trust": 0.1,
"url": "https://github.com/arpsyndicate/kenzer-templates"
}
],
"sources": [
{
"db": "CNVD",
"id": "CNVD-2015-06784"
},
{
"db": "VULHUB",
"id": "VHN-84438"
},
{
"db": "VULMON",
"id": "CVE-2015-6477"
},
{
"db": "BID",
"id": "77075"
},
{
"db": "JVNDB",
"id": "JVNDB-2015-005367"
},
{
"db": "CNNVD",
"id": "CNNVD-201510-325"
},
{
"db": "NVD",
"id": "CVE-2015-6477"
}
]
},
"sources": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#",
"data": {
"@container": "@list"
}
},
"data": [
{
"db": "IVD",
"id": "7c6016ce-2351-11e6-abef-000c29c66e3d"
},
{
"db": "CNVD",
"id": "CNVD-2015-06784"
},
{
"db": "VULHUB",
"id": "VHN-84438"
},
{
"db": "VULMON",
"id": "CVE-2015-6477"
},
{
"db": "BID",
"id": "77075"
},
{
"db": "JVNDB",
"id": "JVNDB-2015-005367"
},
{
"db": "CNNVD",
"id": "CNNVD-201510-325"
},
{
"db": "NVD",
"id": "CVE-2015-6477"
}
]
},
"sources_release_date": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources_release_date#",
"data": {
"@container": "@list"
}
},
"data": [
{
"date": "2015-10-22T00:00:00",
"db": "IVD",
"id": "7c6016ce-2351-11e6-abef-000c29c66e3d"
},
{
"date": "2015-10-22T00:00:00",
"db": "CNVD",
"id": "CNVD-2015-06784"
},
{
"date": "2015-10-18T00:00:00",
"db": "VULHUB",
"id": "VHN-84438"
},
{
"date": "2015-10-18T00:00:00",
"db": "VULMON",
"id": "CVE-2015-6477"
},
{
"date": "2015-10-13T00:00:00",
"db": "BID",
"id": "77075"
},
{
"date": "2015-10-20T00:00:00",
"db": "JVNDB",
"id": "JVNDB-2015-005367"
},
{
"date": "2015-10-19T00:00:00",
"db": "CNNVD",
"id": "CNNVD-201510-325"
},
{
"date": "2015-10-18T19:59:01.400000",
"db": "NVD",
"id": "CVE-2015-6477"
}
]
},
"sources_update_date": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources_update_date#",
"data": {
"@container": "@list"
}
},
"data": [
{
"date": "2015-10-22T00:00:00",
"db": "CNVD",
"id": "CNVD-2015-06784"
},
{
"date": "2016-12-07T00:00:00",
"db": "VULHUB",
"id": "VHN-84438"
},
{
"date": "2016-12-07T00:00:00",
"db": "VULMON",
"id": "CVE-2015-6477"
},
{
"date": "2015-10-13T00:00:00",
"db": "BID",
"id": "77075"
},
{
"date": "2015-10-20T00:00:00",
"db": "JVNDB",
"id": "JVNDB-2015-005367"
},
{
"date": "2015-10-19T00:00:00",
"db": "CNNVD",
"id": "CNNVD-201510-325"
},
{
"date": "2024-11-21T02:35:02.827000",
"db": "NVD",
"id": "CVE-2015-6477"
}
]
},
"threat_type": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/threat_type#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "remote",
"sources": [
{
"db": "CNNVD",
"id": "CNNVD-201510-325"
}
],
"trust": 0.6
},
"title": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/title#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "Nordex Control 2 SCADA of Wind Farm Portal Application cross-site scripting vulnerability",
"sources": [
{
"db": "JVNDB",
"id": "JVNDB-2015-005367"
}
],
"trust": 0.8
},
"type": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/type#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "XSS",
"sources": [
{
"db": "CNNVD",
"id": "CNNVD-201510-325"
}
],
"trust": 0.6
}
}
Loading…
Loading…
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.
Loading…
Loading…