The web interface for NSSLGlobal SatLink VSAT Modem Unit (VMU) devices before 18.1.0 doesn't properly sanitize input for error messages, leading to the ability to inject client-side code.
References
Link | Resource |
---|---|
https://www.trustwave.com/en-us/resources/blogs/spiderlabs-blog/cve-2019-15652-satlink-vsat-vulnerabilities/ | Third Party Advisory |
https://www.trustwave.com/en-us/resources/security-resources/security-advisories/?fid=26455 | Exploit Third Party Advisory |
https://www.trustwave.com/en-us/resources/blogs/spiderlabs-blog/cve-2019-15652-satlink-vsat-vulnerabilities/ | Third Party Advisory |
https://www.trustwave.com/en-us/resources/security-resources/security-advisories/?fid=26455 | Exploit Third Party Advisory |
Configurations
Configuration 1 (hide)
AND |
|
History
21 Nov 2024, 04:29
Type | Values Removed | Values Added |
---|---|---|
References | () https://www.trustwave.com/en-us/resources/blogs/spiderlabs-blog/cve-2019-15652-satlink-vsat-vulnerabilities/ - Third Party Advisory | |
References | () https://www.trustwave.com/en-us/resources/security-resources/security-advisories/?fid=26455 - Exploit, Third Party Advisory |
Information
Published : 2019-11-22 18:15
Updated : 2024-11-21 04:29
NVD link : CVE-2019-15652
Mitre link : CVE-2019-15652
CVE.ORG link : CVE-2019-15652
JSON object : View
Products Affected
nssglobal
- satlink_2910
- satlink_2000
- vmu_software
- satlink_2900
CWE
CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')