CVE-2023-2388
A vulnerability, which was classified as problematic, has been found in Netgear SRX5308 up to 4.3.5-3. Affected by this issue is some unknown functionality of the file scgi-bin/platform.cgi?page=firewall_logs_email.htm of the component Web Management Interface. The manipulation of the argument smtpServer.fromAddr leads to cross site scripting. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. VDB-227666 is the identifier assigned to this vulnerability. NOTE: The vendor was contacted early about this disclosure but did not respond in any way.
Published
2023-04-28T20:15:14.020
Last Modified
2024-11-21T07:58:31.037
Status
Modified
Source
[email protected]
Severity
CVSSv3.1: 2.4 (LOW)
CVSSv2 Vector
AV:N/AC:L/Au:M/C:N/I:P/A:N
- Access Vector: NETWORK
- Access Complexity: LOW
- Authentication: MULTIPLE
- Confidentiality Impact: NONE
- Integrity Impact: PARTIAL
- Availability Impact: NONE
Exploitability Score
6.4
Impact Score
2.9
Weaknesses
Affected Vendors & Products
References
-
https://github.com/leetsun/IoT/tree/main/Netgear-SRX5308/8
Exploit, Third Party Advisory
([email protected])
-
https://vuldb.com/?ctiid.227666
Permissions Required, Third Party Advisory, VDB Entry
([email protected])
-
https://vuldb.com/?id.227666
Permissions Required, Third Party Advisory, VDB Entry
([email protected])
-
https://github.com/leetsun/IoT/tree/main/Netgear-SRX5308/8
Exploit, Third Party Advisory
(af854a3a-2127-422b-91ae-364da2661108)
-
https://vuldb.com/?ctiid.227666
Permissions Required, Third Party Advisory, VDB Entry
(af854a3a-2127-422b-91ae-364da2661108)
-
https://vuldb.com/?id.227666
Permissions Required, Third Party Advisory, VDB Entry
(af854a3a-2127-422b-91ae-364da2661108)