Vulnerability Description
SteVe is an open platform that implements different version of the OCPP protocol for Electric Vehicle charge points, acting as a central server for management of registered charge points. Attackers can inject arbitrary HTML and Javascript code via WebSockets leading to persistent Cross-Site Scripting in the SteVe management interface.
CVSS Score
MEDIUM
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Steve-Community | Steve | <= 3.5.1 |
Related Weaknesses (CWE)
References
- https://github.com/steve-community/steve/blob/steve-3.6.0/src/main/java/de/rwth/Product
- https://github.com/steve-community/steve/commit/a79983f843c37705182c8f54eba060c1Patch
- https://github.com/steve-community/steve/issues/1526Issue TrackingPatch
- https://github.com/steve-community/steve/pull/1527Issue TrackingPatch
FAQ
What is CVE-2024-21550?
CVE-2024-21550 is a vulnerability with a CVSS score of 6.1 (MEDIUM). SteVe is an open platform that implements different version of the OCPP protocol for Electric Vehicle charge points, acting as a central server for management of registered charge points. Attackers ca...
How severe is CVE-2024-21550?
CVE-2024-21550 has been rated MEDIUM with a CVSS base score of 6.1/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2024-21550?
Check the references section above for vendor advisories and patch information. Affected products include: Steve-Community Steve.