In Airspan AirSpot 5410 version 0.3.4.1-4 and under there exists a stored XSS vulnerability. As the binary file /home/www/cgi-bin/login.cgi does not check if the user is authenticated, a malicious actor can craft a specific request on the login.cgi endpoint that contains a base32 encoded XSS payload that will be accepted and stored. A successful attack will results in the injection of malicious scripts into the user settings page.
Advisories
Source ID Title
EUVD EUVD EUVD-2022-38984 In Airspan AirSpot 5410 version 0.3.4.1-4 and under there exists a stored XSS vulnerability. As the binary file /home/www/cgi-bin/login.cgi does not check if the user is authenticated, a malicious actor can craft a specific request on the login.cgi endpoint that contains a base32 encoded XSS payload that will be accepted and stored. A successful attack will results in the injection of malicious scripts into the user settings page.
Fixes

Solution

No solution given by the vendor.


Workaround

No workaround given by the vendor.

History

No history.

cve-icon MITRE

Status: PUBLISHED

Assigner: mitre

Published:

Updated: 2024-08-03T10:00:04.483Z

Reserved: 2022-07-18T00:00:00

Link: CVE-2022-36266

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Modified

Published: 2022-08-08T15:15:08.990

Modified: 2024-11-21T07:12:41.350

Link: CVE-2022-36266

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.