An information disclosure vulnerability exists in the web interface session cookie functionality of InHand Networks InRouter302 V3.5.4. The session cookie misses the HttpOnly flag, making it accessible via JavaScript and thus allowing an attacker, able to perform an XSS attack, to steal the session cookie.
References
Link | Resource |
---|---|
https://talosintelligence.com/vulnerability_reports/TALOS-2022-1470 | Exploit Technical Description Third Party Advisory |
https://www.inhandnetworks.com/upload/attachment/202205/10/InHand-PSA-2022-01.pdf | Vendor Advisory |
https://talosintelligence.com/vulnerability_reports/TALOS-2022-1470 | Exploit Technical Description Third Party Advisory |
https://www.inhandnetworks.com/upload/attachment/202205/10/InHand-PSA-2022-01.pdf | Vendor Advisory |
Configurations
Configuration 1 (hide)
AND |
|
History
21 Nov 2024, 06:51
Type | Values Removed | Values Added |
---|---|---|
References | () https://talosintelligence.com/vulnerability_reports/TALOS-2022-1470 - Exploit, Technical Description, Third Party Advisory | |
References | () https://www.inhandnetworks.com/upload/attachment/202205/10/InHand-PSA-2022-01.pdf - Vendor Advisory |
23 Jun 2023, 17:59
Type | Values Removed | Values Added |
---|---|---|
CWE | CWE-732 |
Information
Published : 2022-05-12 17:15
Updated : 2024-11-21 06:51
NVD link : CVE-2022-25172
Mitre link : CVE-2022-25172
CVE.ORG link : CVE-2022-25172
JSON object : View
Products Affected
inhandnetworks
- ir302
- ir302_firmware