Client-Side Template Injection in Nokia NetAct
CVE-2023-26060
8.8HIGH
Summary
A vulnerability exists in Nokia NetAct that allows internal users to create a Working Set with malicious client-side template injection payloads. This issue is due to insufficient input validation during the creation of Working Sets on the Working Set Manager page. Although external exploitation is challenging due to required dynamic parameters like Jsession-id, a CSRF token, and an Nxsrf token, the risk remains significant within internal environments.
References
CVSS V3.1
Score:
8.8
Severity:
HIGH
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
Low
User Interaction:
None
Scope:
Unchanged
Timeline
Vulnerability published
Vulnerability Reserved