Vulnerability Description
Allied Telesis 8100L/8 devices allow XSS via the edit-ipv4_interface.php vlanid or subnet_mask parameter.
CVSS Score
6.1
MEDIUM
CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Alliedtelesis | 8100L\/8 Firmware | - |
| Alliedtelesis | 8100L\/8 | - |
Related Weaknesses (CWE)
References
- http://packetstormsecurity.com/files/151327/SirsiDynix-e-Library-3.5.x-Cross-SitExploitThird Party AdvisoryVDB Entry
- https://pentest.com.tr/exploits/Allied-Telesis-8100L-8-Cross-Site-Scripting.htmlExploitThird Party Advisory
- https://www.exploit-db.com/exploits/46237/ExploitThird Party AdvisoryVDB Entry
- http://packetstormsecurity.com/files/151327/SirsiDynix-e-Library-3.5.x-Cross-SitExploitThird Party AdvisoryVDB Entry
- https://pentest.com.tr/exploits/Allied-Telesis-8100L-8-Cross-Site-Scripting.htmlExploitThird Party Advisory
- https://www.exploit-db.com/exploits/46237/ExploitThird Party AdvisoryVDB Entry
FAQ
What is CVE-2018-20503?
CVE-2018-20503 is a vulnerability with a CVSS score of 6.1 (MEDIUM). Allied Telesis 8100L/8 devices allow XSS via the edit-ipv4_interface.php vlanid or subnet_mask parameter.
How severe is CVE-2018-20503?
CVE-2018-20503 has been rated MEDIUM with a CVSS base score of 6.1/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2018-20503?
Check the references section above for vendor advisories and patch information. Affected products include: Alliedtelesis 8100L\/8 Firmware, Alliedtelesis 8100L\/8.