Skip to main content

CVE-2023-46471: n/a in n/a

Medium
VulnerabilityCVE-2023-46471cvecve-2023-46471
Published: Mon Nov 20 2023 (11/20/2023, 00:00:00 UTC)
Source: CVE Database V5
Vendor/Project: n/a
Product: n/a

Description

Cross Site Scripting vulnerability in Space Applications Services Yamcs v.5.8.6 allows a remote attacker to execute arbitrary code via the text variable scriptContainer of the ScriptViewer.

AI-Powered Analysis

AILast updated: 07/11/2025, 02:46:58 UTC

Technical Analysis

CVE-2023-46471 is a Cross Site Scripting (XSS) vulnerability identified in Space Applications Services Yamcs version 5.8.6. The vulnerability arises from improper sanitization or validation of user-supplied input in the 'scriptContainer' text variable within the ScriptViewer component. An attacker can exploit this flaw by injecting malicious scripts that execute arbitrary code in the context of the victim's browser session. This type of vulnerability falls under CWE-79, which is a common web application security weakness. The CVSS 3.1 base score of 5.4 indicates a medium severity level, with the vector showing that the attack can be performed remotely over the network (AV:N), requires low attack complexity (AC:L), requires privileges (PR:L), and user interaction (UI:R). The scope is changed (S:C), meaning the vulnerability affects resources beyond the initially vulnerable component. The impact on confidentiality and integrity is low, and availability is not affected. No known exploits are currently reported in the wild, and no patches or vendor advisories are listed yet. This vulnerability could allow an attacker with some level of authenticated access to trick users into executing malicious scripts, potentially leading to session hijacking, data theft, or unauthorized actions within the affected Yamcs application environment.

Potential Impact

For European organizations using Yamcs 5.8.6, particularly those involved in space applications, telemetry, or mission control systems, this vulnerability poses a risk of client-side code execution that can compromise user sessions and data integrity. Although the CVSS score is medium, the requirement for some level of privileges and user interaction reduces the likelihood of widespread automated exploitation. However, targeted attacks could lead to unauthorized access to sensitive telemetry data or manipulation of mission-critical information. This could impact organizations in aerospace, research institutions, and governmental agencies involved in space operations. The confidentiality and integrity of data processed or visualized through the ScriptViewer could be compromised, potentially affecting operational decisions or exposing sensitive information. The lack of a patch increases the urgency for temporary mitigations to prevent exploitation.

Mitigation Recommendations

Organizations should implement strict input validation and output encoding for all user-supplied data in the ScriptViewer component to prevent script injection. Until an official patch is released, applying web application firewalls (WAFs) with custom rules to detect and block malicious script payloads targeting the 'scriptContainer' parameter is recommended. Restricting access to the Yamcs interface to trusted users and networks can reduce exposure. Additionally, educating users about the risks of interacting with untrusted links or inputs within the application can mitigate social engineering vectors. Monitoring logs for unusual script execution attempts or anomalies in user behavior can help detect exploitation attempts early. Finally, organizations should track vendor communications for patches or updates addressing this vulnerability and apply them promptly once available.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
mitre
Date Reserved
2023-10-23T00:00:00.000Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 68487f571b0bd07c3938a698

Added to database: 6/10/2025, 6:54:15 PM

Last enriched: 7/11/2025, 2:46:58 AM

Last updated: 8/12/2025, 5:39:39 AM

Views: 14

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats