cve/2023/CVE-2023-24497.md
2024-06-18 02:51:15 +02:00

18 lines
968 B
Markdown

### [CVE-2023-24497](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-24497)
![](https://img.shields.io/static/v1?label=Product&message=MilesightVPN&color=blue)
![](https://img.shields.io/static/v1?label=Version&message=%3D%20v2.0.2%20&color=brighgreen)
![](https://img.shields.io/static/v1?label=Vulnerability&message=CWE-80%3A%20Improper%20Neutralization%20of%20Script-Related%20HTML%20Tags%20in%20a%20Web%20Page%20(Basic%20XSS)&color=brighgreen)
### Description
Cross-site scripting (xss) vulnerabilities exist in the requestHandlers.js detail_device functionality of Milesight VPN v2.0.2. A specially-crafted HTTP request can lead to arbitrary Javascript code injection. An attacker can send an HTTP request to trigger these vulnerabilities.This XSS is exploited through the remote_subnet field of the database
### POC
#### Reference
- https://talosintelligence.com/vulnerability_reports/TALOS-2023-1704
#### Github
No PoCs found on GitHub currently.