An issue was discovered on Vera VeraEdge 1.7.19 and Veralite 1.7.481 devices. The device provides a shell script called connect.sh which is supposed to return a specific cookie for the user when the user is authenticated to https://home.getvera.com. One of the parameters retrieved by this script is "RedirectURL". However, the application lacks strict input validation of this parameter and this allows an attacker to execute the client-side code on this application.
Advisories
Source ID Title
EUVD EUVD EUVD-2017-18325 An issue was discovered on Vera VeraEdge 1.7.19 and Veralite 1.7.481 devices. The device provides a shell script called connect.sh which is supposed to return a specific cookie for the user when the user is authenticated to https://home.getvera.com. One of the parameters retrieved by this script is "RedirectURL". However, the application lacks strict input validation of this parameter and this allows an attacker to execute the client-side code on this application.
Fixes

Solution

No solution given by the vendor.


Workaround

No workaround given by the vendor.

History

No history.

Projects

Sign in to view the affected projects.

cve-icon MITRE

Status: PUBLISHED

Assigner: mitre

Published:

Updated: 2024-08-05T17:02:44.438Z

Reserved: 2017-06-02T00:00:00

Link: CVE-2017-9390

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Modified

Published: 2019-06-17T20:15:09.477

Modified: 2024-11-21T03:36:01.707

Link: CVE-2017-9390

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.

Weaknesses