A number of stored XSS vulnerabilities have been identified in the web configuration feature in ENTTEC Datagate Mk2 70044_update_05032019-482 that could allow an unauthenticated threat actor to inject malicious code directly into the application. This affects, for example, the Profile Description field in JSON data to the Profile Editor.
References
Link | Resource |
---|---|
https://www.mogozobo.com/?p=3476 | Exploit Third Party Advisory |
https://www.mogozobo.com/?p=3476 | Exploit Third Party Advisory |
Configurations
Configuration 1 (hide)
AND |
|
Configuration 2 (hide)
AND |
|
Configuration 3 (hide)
AND |
|
Configuration 4 (hide)
AND |
|
History
21 Nov 2024, 04:23
Type | Values Removed | Values Added |
---|---|---|
References | () https://www.mogozobo.com/?p=3476 - Exploit, Third Party Advisory |
Information
Published : 2019-06-07 16:29
Updated : 2024-11-21 04:23
NVD link : CVE-2019-12774
Mitre link : CVE-2019-12774
CVE.ORG link : CVE-2019-12774
JSON object : View
Products Affected
enttec
- datagate_mk2
- datagate_mk2_firmware
- e-streamer_mk2
- storm_24_firmware
- pixelator
- pixelator_firmware
- storm_24
- e-streamer_mk2_firmware
CWE
CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')