CVE-2022-28867

An issue was discovered in Nokia NetAct 22 through the Administration of Measurements website section. A malicious user can edit or add the templateName parameter in order to include JavaScript code, which is then stored and executed by a victim's web browser. The most common mechanism for delivering malicious content is to include it as a parameter in a URL that is posted publicly or e-mailed directly to victims. Here, the /aom/html/EditTemplate.jsf and /aom/html/ViewAllTemplatesPage.jsf templateName parameter is used.
Configurations

Configuration 1 (hide)

cpe:2.3:a:nokia:netact:22.0.0.62:*:*:*:*:*:*:*

History

02 Aug 2023, 01:05

Type Values Removed Values Added
CPE cpe:2.3:a:nokia:netact:22.0.0.62:*:*:*:*:*:*:*
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 5.4
CWE CWE-79
References (MISC) https://www.gruppotim.it/it/footer/red-team.html - (MISC) https://www.gruppotim.it/it/footer/red-team.html - Exploit, Third Party Advisory
References (MISC) https://www.telecomitalia.com/tit/it/innovazione/cybersecurity/red-team.html - (MISC) https://www.telecomitalia.com/tit/it/innovazione/cybersecurity/red-team.html - Not Applicable

24 Jul 2023, 14:15

Type Values Removed Values Added
New CVE

Information

Published : 2023-07-24 14:15

Updated : 2024-02-05 00:01


NVD link : CVE-2022-28867

Mitre link : CVE-2022-28867

CVE.ORG link : CVE-2022-28867


JSON object : View

Products Affected

nokia

  • netact
CWE
CWE-79

Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')