CVE-2020-13260

A vulnerability in the web-based management interface of RAD SecFlow-1v through 2020-05-21 could allow an authenticated attacker to upload a JavaScript file, with a stored XSS payload, that will remain stored in the system as an OVPN file in Configuration-Services-Security-OpenVPN-Config or as the static key file in Configuration-Services-Security-OpenVPN-Static Keys. This payload will execute each time a user opens an affected web page. This could be exploited in conjunction with CVE-2020-13259.
References
Link Resource
https://www.rad.com/products/secflow-1v-IIoT-Gateway#panels-ipe-paneid-143837 Product Vendor Advisory
https://cxsecurity.com/issue/WLB-2020090063 Exploit Third Party Advisory
https://www.exploit-db.com/exploits/48807 Exploit Third Party Advisory VDB Entry
Advertisement

NeevaHost hosting service

Configurations

Configuration 1 (hide)

AND
cpe:2.3:o:rad:secflow-1v_firmware:os-image_sf_0290_2.3.01.26:*:*:*:*:*:*:*
cpe:2.3:h:rad:secflow-1v:-:*:*:*:*:*:*:*

Information

Published : 2020-09-17 13:15

Updated : 2021-07-21 04:39


NVD link : CVE-2020-13260

Mitre link : CVE-2020-13260


JSON object : View

CWE
CWE-79

Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')

CWE-434

Unrestricted Upload of File with Dangerous Type

Advertisement

dedicated server usa

Products Affected

rad

  • secflow-1v_firmware
  • secflow-1v