Cobham Satcom Sailor 800 and 900 devices contained persistent XSS, which required administrative access to exploit. The vulnerability was exploitable by acquiring a copy of the device's configuration file, inserting an XSS payload into a relevant field (e.g., Satellite name), and then restoring the malicious configuration file.
References
Link | Resource |
---|---|
https://cyberskr.com/blog/cobham-satcom-800-900.html | Third Party Advisory |
https://gist.github.com/CyberSKR/fe21b920c8933867ea262a325d37f03b | Third Party Advisory |
History
No history.
MITRE Information
Status: PUBLISHED
Assigner: mitre
Published: 2019-03-15T16:00:00
Updated: 2019-03-15T15:57:01
Reserved: 2018-11-20T00:00:00
Link: CVE-2018-19394
JSON object: View
NVD Information
Status : Analyzed
Published: 2019-03-15T16:29:00.467
Modified: 2019-03-15T17:34:18.283
Link: CVE-2018-19394
JSON object: View
Redhat Information
No data.
CWE