Логотип exploitDog
bind:CVE-2023-26060
Консоль
Логотип exploitDog

exploitDog

bind:CVE-2023-26060

Количество 3

Количество 3

nvd логотип

CVE-2023-26060

почти 3 года назад

An issue was discovered in Nokia NetAct before 22 FP2211. On the Working Set Manager page, users can create a Working Set with a name that has a client-side template injection payload. Input validation is missing during creation of the working set. For an external attacker, it is very difficult to exploit this, because a few dynamically created parameters such as Jsession-id, a CSRF token, and an Nxsrf token would be needed. The attack can realistically only be performed by an internal user.

CVSS3: 6.8
EPSS: Низкий
github логотип

GHSA-pgrj-wm9q-gw8p

почти 3 года назад

An issue was discovered in Nokia NetAct before 22 FP2211. On the Working Set Manager page, users can create a Working Set with a name that has a client-side template injection payload. Input validation is missing during creation of the working set. For an external attacker, it is very difficult to exploit this, because a few dynamically created parameters such as Jsession-id, a CSRF token, and an Nxsrf token would be needed. The attack can realistically only be performed by an internal user.

CVSS3: 6.8
EPSS: Низкий
fstec логотип

BDU:2023-01304

больше 3 лет назад

Уязвимость системы управления сетью NetAct, связанная связана с отсутствием проверки ввода при создании рабочего набора (working set), позволяющая нарушителю выполнить произвольный JavaScript-код

CVSS3: 6.8
EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
nvd логотип
CVE-2023-26060

An issue was discovered in Nokia NetAct before 22 FP2211. On the Working Set Manager page, users can create a Working Set with a name that has a client-side template injection payload. Input validation is missing during creation of the working set. For an external attacker, it is very difficult to exploit this, because a few dynamically created parameters such as Jsession-id, a CSRF token, and an Nxsrf token would be needed. The attack can realistically only be performed by an internal user.

CVSS3: 6.8
0%
Низкий
почти 3 года назад
github логотип
GHSA-pgrj-wm9q-gw8p

An issue was discovered in Nokia NetAct before 22 FP2211. On the Working Set Manager page, users can create a Working Set with a name that has a client-side template injection payload. Input validation is missing during creation of the working set. For an external attacker, it is very difficult to exploit this, because a few dynamically created parameters such as Jsession-id, a CSRF token, and an Nxsrf token would be needed. The attack can realistically only be performed by an internal user.

CVSS3: 6.8
0%
Низкий
почти 3 года назад
fstec логотип
BDU:2023-01304

Уязвимость системы управления сетью NetAct, связанная связана с отсутствием проверки ввода при создании рабочего набора (working set), позволяющая нарушителю выполнить произвольный JavaScript-код

CVSS3: 6.8
0%
Низкий
больше 3 лет назад

Уязвимостей на страницу