An information disclosure vulnerability exists in the web interface session cookie functionality of InHand Networks InRouter302 V3.5.4. The session cookie misses the HttpOnly flag, making it accessible via JavaScript and thus allowing an attacker, able to perform an XSS attack, to steal the session cookie.
References
Link | Resource |
---|---|
https://www.inhandnetworks.com/upload/attachment/202205/10/InHand-PSA-2022-01.pdf | Vendor Advisory |
https://talosintelligence.com/vulnerability_reports/TALOS-2022-1470 | Exploit Technical Description Third Party Advisory |
Configurations
Configuration 1 (hide)
AND |
|
Information
Published : 2022-05-12 10:15
Updated : 2022-05-23 11:14
NVD link : CVE-2022-25172
Mitre link : CVE-2022-25172
JSON object : View
CWE
CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
Products Affected
inhandnetworks
- ir302
- ir302_firmware