CVE-2020-13260

A vulnerability in the web-based management interface of RAD SecFlow-1v through 2020-05-21 could allow an authenticated attacker to upload a JavaScript file, with a stored XSS payload, that will remain stored in the system as an OVPN file in Configuration-Services-Security-OpenVPN-Config or as the static key file in Configuration-Services-Security-OpenVPN-Static Keys. This payload will execute each time a user opens an affected web page. This could be exploited in conjunction with CVE-2020-13259.
References
Configurations

Configuration 1 (hide)

AND
cpe:2.3:o:rad:secflow-1v_firmware:os-image_sf_0290_2.3.01.26:*:*:*:*:*:*:*
cpe:2.3:h:rad:secflow-1v:-:*:*:*:*:*:*:*

History

21 Nov 2024, 05:00

Type Values Removed Values Added
References () https://cxsecurity.com/issue/WLB-2020090063 - Exploit, Third Party Advisory () https://cxsecurity.com/issue/WLB-2020090063 - Exploit, Third Party Advisory
References () https://www.exploit-db.com/exploits/48807 - Exploit, Third Party Advisory, VDB Entry () https://www.exploit-db.com/exploits/48807 - Exploit, Third Party Advisory, VDB Entry
References () https://www.rad.com/products/secflow-1v-IIoT-Gateway#panels-ipe-paneid-143837 - Product, Vendor Advisory () https://www.rad.com/products/secflow-1v-IIoT-Gateway#panels-ipe-paneid-143837 - Product, Vendor Advisory

Information

Published : 2020-09-17 20:15

Updated : 2024-11-21 05:00


NVD link : CVE-2020-13260

Mitre link : CVE-2020-13260

CVE.ORG link : CVE-2020-13260


JSON object : View

Products Affected

rad

  • secflow-1v
  • secflow-1v_firmware
CWE
CWE-79

Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')

CWE-434

Unrestricted Upload of File with Dangerous Type