CVE-2023-2389
A vulnerability, which was classified as problematic, was found in Netgear SRX5308 up to 4.3.5-3. This affects an unknown part of the file scgi-bin/platform.cgi?page=firewall_logs_email.htm of the component Web Management Interface. The manipulation of the argument smtpServer.emailServer leads to cross site scripting. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-227667. NOTE: The vendor was contacted early about this disclosure but did not respond in any way.
Published
2023-04-28T20:15:14.090
Last Modified
2024-11-21T07:58:31.167
Status
Modified
Source
[email protected]
Severity
CVSSv3.1: 2.4 (LOW)
CVSSv2 Vector
AV:N/AC:L/Au:M/C:N/I:P/A:N
- Access Vector: NETWORK
- Access Complexity: LOW
- Authentication: MULTIPLE
- Confidentiality Impact: NONE
- Integrity Impact: PARTIAL
- Availability Impact: NONE
Exploitability Score
6.4
Impact Score
2.9
Weaknesses
Affected Vendors & Products
References
-
https://github.com/leetsun/IoT/tree/main/Netgear-SRX5308/9
Exploit, Third Party Advisory
([email protected])
-
https://vuldb.com/?ctiid.227667
Permissions Required, Third Party Advisory, VDB Entry
([email protected])
-
https://vuldb.com/?id.227667
Permissions Required, Third Party Advisory, VDB Entry
([email protected])
-
https://github.com/leetsun/IoT/tree/main/Netgear-SRX5308/9
Exploit, Third Party Advisory
(af854a3a-2127-422b-91ae-364da2661108)
-
https://vuldb.com/?ctiid.227667
Permissions Required, Third Party Advisory, VDB Entry
(af854a3a-2127-422b-91ae-364da2661108)
-
https://vuldb.com/?id.227667
Permissions Required, Third Party Advisory, VDB Entry
(af854a3a-2127-422b-91ae-364da2661108)