Cobham Satcom Sailor 250 and 500 devices before 1.25 contained persistent XSS, which could be exploited by an unauthenticated threat actor via the /index.lua?pageID=Phone%20book name field.
References
Link | Resource |
---|---|
https://cyberskr.com/blog/cobham-satcom-250-500.html | Exploit Third Party Advisory |
https://gist.github.com/CyberSKR/f6fc93702b9b9b73afa07877d1479fe0 | Third Party Advisory |
History
No history.
MITRE Information
Status: PUBLISHED
Assigner: mitre
Published: 2019-03-15T16:00:00
Updated: 2019-03-15T15:57:01
Reserved: 2018-11-20T00:00:00
Link: CVE-2018-19391
JSON object: View
NVD Information
Status : Analyzed
Published: 2019-03-15T16:29:00.263
Modified: 2019-03-15T17:40:41.040
Link: CVE-2018-19391
JSON object: View
Redhat Information
No data.
CWE