Cobham Satcom Sailor 800 and 900 devices contained persistent XSS, which required administrative access to exploit. The vulnerability was exploitable by acquiring a copy of the device's configuration file, inserting an XSS payload into a relevant field (e.g., Satellite name), and then restoring the malicious configuration file.
References
Link | Resource |
---|---|
https://gist.github.com/CyberSKR/fe21b920c8933867ea262a325d37f03b | Third Party Advisory |
https://cyberskr.com/blog/cobham-satcom-800-900.html | Third Party Advisory |
Information
Published : 2019-03-15 09:29
Updated : 2019-03-15 10:34
NVD link : CVE-2018-19394
Mitre link : CVE-2018-19394
JSON object : View
CWE
CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
Products Affected
cobham
- satcom_sailor_900
- satcom_sailor_900_firmware
- satcom_sailor_800
- satcom_sailor_800_firmware