Vulnerability Description
An issue was discovered in Nokia NetAct 22 through the Administration of Measurements website section. A malicious user can edit or add the templateName parameter in order to include JavaScript code, which is then stored and executed by a victim's web browser. The most common mechanism for delivering malicious content is to include it as a parameter in a URL that is posted publicly or e-mailed directly to victims. Here, the /aom/html/EditTemplate.jsf and /aom/html/ViewAllTemplatesPage.jsf templateName parameter is used.
CVSS Score
MEDIUM
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Nokia | Netact | 22.0.0.62 |
Related Weaknesses (CWE)
References
- https://www.gruppotim.it/it/footer/red-team.htmlExploitThird Party Advisory
- https://www.telecomitalia.com/tit/it/innovazione/cybersecurity/red-team.htmlNot Applicable
- https://www.gruppotim.it/it/footer/red-team.htmlExploitThird Party Advisory
- https://www.telecomitalia.com/tit/it/innovazione/cybersecurity/red-team.htmlNot Applicable
FAQ
What is CVE-2022-28867?
CVE-2022-28867 is a vulnerability with a CVSS score of 5.4 (MEDIUM). An issue was discovered in Nokia NetAct 22 through the Administration of Measurements website section. A malicious user can edit or add the templateName parameter in order to include JavaScript code, ...
How severe is CVE-2022-28867?
CVE-2022-28867 has been rated MEDIUM with a CVSS base score of 5.4/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2022-28867?
Check the references section above for vendor advisories and patch information. Affected products include: Nokia Netact.