An OS command injection
vulnerability exists in XWEB Pro version 1.12.1 and prior, enabling an
authenticated attacker to achieve remote code execution on the system by
sending malicious input injected into the server username field of the
import preconfiguration action in the API V1 route.
Copeland has provided a fix for the vulnerabilities and recommends users
update the XWEB Pro to the latest version by going to their software
update page
https://webapps.copeland.com/Dixell/Pages/SystemSoftwareUpdate in the
sections dedicated to the different XWEBPRO models page.
Alternatively, a user logged into an XWEB Pro with internet access can
update XWEB Pro directly from Copeland servers via the menu SYSTEM --
Updates | Network.
Configurations
Workarounds
Exploits
Credits
finder
Amir Zaltzman and Noam Moshe of Claroty Team82 reported this vulnerability to CISA.