Cobham Satcom Sailor 800 and 900 devices contained persistent XSS, which required administrative access to exploit. The vulnerability was exploitable by acquiring a copy of the device's configuration file, inserting an XSS payload into a relevant field (e.g., Satellite name), and then restoring the malicious configuration file.
Advisories
Source ID Title
EUVD EUVD EUVD-2018-11087 Cobham Satcom Sailor 800 and 900 devices contained persistent XSS, which required administrative access to exploit. The vulnerability was exploitable by acquiring a copy of the device's configuration file, inserting an XSS payload into a relevant field (e.g., Satellite name), and then restoring the malicious configuration file.
Fixes

Solution

No solution given by the vendor.


Workaround

No workaround given by the vendor.

History

No history.

cve-icon MITRE

Status: PUBLISHED

Assigner: mitre

Published:

Updated: 2024-08-05T11:37:11.067Z

Reserved: 2018-11-20T00:00:00

Link: CVE-2018-19394

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Modified

Published: 2019-03-15T16:29:00.467

Modified: 2024-11-21T03:57:51.090

Link: CVE-2018-19394

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.