Show plain JSON{"id": "CVE-2018-19394", "metrics": {"cvssMetricV2": [{"type": "Primary", "source": "nvd@nist.gov", "cvssData": {"version": "2.0", "baseScore": 3.5, "accessVector": "NETWORK", "vectorString": "AV:N/AC:M/Au:S/C:N/I:P/A:N", "authentication": "SINGLE", "integrityImpact": "PARTIAL", "accessComplexity": "MEDIUM", "availabilityImpact": "NONE", "confidentialityImpact": "NONE"}, "acInsufInfo": false, "impactScore": 2.9, "baseSeverity": "LOW", "obtainAllPrivilege": false, "exploitabilityScore": 6.8, "obtainUserPrivilege": false, "obtainOtherPrivilege": false, "userInteractionRequired": true}], "cvssMetricV30": [{"type": "Primary", "source": "nvd@nist.gov", "cvssData": {"scope": "CHANGED", "version": "3.0", "baseScore": 4.8, "attackVector": "NETWORK", "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N", "integrityImpact": "LOW", "userInteraction": "REQUIRED", "attackComplexity": "LOW", "availabilityImpact": "NONE", "privilegesRequired": "HIGH", "confidentialityImpact": "LOW"}, "impactScore": 2.7, "exploitabilityScore": 1.7}]}, "published": "2019-03-15T16:29:00.467", "references": [{"url": "https://cyberskr.com/blog/cobham-satcom-800-900.html", "tags": ["Third Party Advisory"], "source": "cve@mitre.org"}, {"url": "https://gist.github.com/CyberSKR/fe21b920c8933867ea262a325d37f03b", "tags": ["Third Party Advisory"], "source": "cve@mitre.org"}, {"url": "https://cyberskr.com/blog/cobham-satcom-800-900.html", "tags": ["Third Party Advisory"], "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "https://gist.github.com/CyberSKR/fe21b920c8933867ea262a325d37f03b", "tags": ["Third Party Advisory"], "source": "af854a3a-2127-422b-91ae-364da2661108"}], "vulnStatus": "Modified", "weaknesses": [{"type": "Primary", "source": "nvd@nist.gov", "description": [{"lang": "en", "value": "CWE-79"}]}], "descriptions": [{"lang": "en", "value": "Cobham Satcom Sailor 800 and 900 devices contained persistent XSS, which required administrative access to exploit. The vulnerability was exploitable by acquiring a copy of the device's configuration file, inserting an XSS payload into a relevant field (e.g., Satellite name), and then restoring the malicious configuration file."}, {"lang": "es", "value": "Los dispositivos Cobham Satcom Sailor 800 y 900 conten\u00edan Cross-Site Scripting (XSS) persistente, que requer\u00eda acceso administrativo para su explotaci\u00f3n. La vulnerabilidad era explotable adquiriendo una copia del archivo de configuraci\u00f3n del dispositivo, insertando una carga \u00fatil XSS en un campo relevante (por ejemplo, \"Satellite name\") y, despu\u00e9s, recuperando el archivo de configuraci\u00f3n malicioso."}], "lastModified": "2024-11-21T03:57:51.090", "configurations": [{"nodes": [{"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:o:cobham:satcom_sailor_800_firmware:-:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "DC1C724B-5F9F-4303-A46A-1CF79B74CC86"}], "operator": "OR"}, {"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:h:cobham:satcom_sailor_800:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "FAE54DE4-318E-4E4C-9A5E-A574AAEAE876"}], "operator": "OR"}], "operator": "AND"}, {"nodes": [{"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:o:cobham:satcom_sailor_900_firmware:-:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "38951D3E-266C-46FE-A67B-A2224A1EEBBD"}], "operator": "OR"}, {"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:h:cobham:satcom_sailor_900:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "3341A126-A6C7-4694-B466-D2BBE0F83A71"}], "operator": "OR"}], "operator": "AND"}], "sourceIdentifier": "cve@mitre.org"}