Cobham Satcom Sailor 250 and 500 devices before 1.25 contained persistent XSS, which could be exploited by an unauthenticated threat actor via the /index.lua?pageID=Phone%20book name field.
References
Link | Resource |
---|---|
https://cyberskr.com/blog/cobham-satcom-250-500.html | Exploit Third Party Advisory |
https://gist.github.com/CyberSKR/f6fc93702b9b9b73afa07877d1479fe0 | Third Party Advisory |
https://cyberskr.com/blog/cobham-satcom-250-500.html | Exploit Third Party Advisory |
https://gist.github.com/CyberSKR/f6fc93702b9b9b73afa07877d1479fe0 | Third Party Advisory |
Configurations
History
21 Nov 2024, 03:57
Type | Values Removed | Values Added |
---|---|---|
References | () https://cyberskr.com/blog/cobham-satcom-250-500.html - Exploit, Third Party Advisory | |
References | () https://gist.github.com/CyberSKR/f6fc93702b9b9b73afa07877d1479fe0 - Third Party Advisory |
Information
Published : 2019-03-15 16:29
Updated : 2024-11-21 03:57
NVD link : CVE-2018-19391
Mitre link : CVE-2018-19391
CVE.ORG link : CVE-2018-19391
JSON object : View
Products Affected
cobham
- satcom_sailor_250_firmware
- satcom_sailor_500
- satcom_sailor_250
- satcom_sailor_500_firmware
CWE
CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')