Cobham Satcom Sailor 250 and 500 devices before 1.25 contained persistent XSS, which could be exploited by an unauthenticated threat actor via the /index.lua?pageID=Phone%20book name field.
References
Link | Resource |
---|---|
https://gist.github.com/CyberSKR/f6fc93702b9b9b73afa07877d1479fe0 | Third Party Advisory |
https://cyberskr.com/blog/cobham-satcom-250-500.html | Exploit Third Party Advisory |
Information
Published : 2019-03-15 09:29
Updated : 2019-03-15 10:40
NVD link : CVE-2018-19391
Mitre link : CVE-2018-19391
JSON object : View
CWE
CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
Products Affected
cobham
- satcom_sailor_250
- satcom_sailor_250_firmware
- satcom_sailor_500
- satcom_sailor_500_firmware