-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA512 Advisory ID: SYSS-2025-045 Product: Airleader Master Manufacturer: Airleader WF Steuerungstechnik GmbH Affected Version(s): <= 6.381 Tested Version(s): 6.381 Vulnerability Type: Cross-Site Scripting (CWE-79) Risk Level: Medium Solution Status: Unresolved Manufacturer Notification: 2025-07-08 Solution Date: - Public Disclosure: 2026-03-03 CVE Reference: Not yet assigned Author of Advisory: Angel Lomeli, SySS GmbH ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ Overview: Airleader Master (see [1]) is a management software for large hardware modules used to control compressed air stations, mainly used in the manufacturing industry. The units are focused on efficiency and economization of resources, allowing for the measuring and control of compressed air quality. They include embedded web interfaces for data visualization and management. The application includes multiple reflected cross-site scripting (RXSS) vulnerabilities, which could be abused to attack other users of the web application. ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ Vulnerability Details: The web application reflects values from parameters without any kind of filtering or escaping in multiple pages, resulting in multiple instances of RXSS. In an RXSS attack, the attacker injects a malicious script into a website. The script is reflected back to the victim user's browser, typically through a crafted URL the user is tricked into clicking. This allows the attacker to execute arbitrary scripts within the user's session to perform different kinds of client-side attacks, such as stealing cookies. The injected code is not permanently stored on the web server. The following pages are affected: #1. /wizard1.jsp #2. /wizard2.jsp #3. /wizard3.jsp #4. /wizard4.jsp #5. /selectDataDir.jsp #6. /wizard_write.jsp ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ Proof of Concept (PoC): #1. /wizard1.jsp Vulnerable parameters: station PoC: http:///wizard1.jsp?station="%2f> #2. /wizard2.jsp Vulnerable parameters: station PoC: http:///wizard2.jsp?station="%2f> #3. /wizard3.jsp Vulnerable parameters: station, appdir, host PoC: http:///wizard3.jsp?host="%2f> #4. /wizard4.jsp Vulnerable parameters: station, appdir, host, model, mess, offline PoC: http:///wizard4.jsp?model="%2f> #5. /selectDataDir.jsp Vulnerable parameters: path PoC: http:///selectDataDir.jsp?cmd=save&path= #6. /wizard_write.jsp Vulnerable parameters: station, appdir, host PoC: http:///wizard_write.jsp?appdir=">