First published: Sun May 28 2017(Updated: )
An issue was discovered in Contiki Operating System 3.0. A Persistent XSS vulnerability is present in the MQTT/IBM Cloud Config page (aka mqtt.html) of cc26xx-web-demo. The cc26xx-web-demo features a webserver that runs on a constrained device. That particular page allows a user to remotely configure that device's operation by sending HTTP POST requests. The vulnerability consists of improper input sanitisation of the text fields on the MQTT/IBM Cloud config page, allowing for JavaScript code injection.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Contiki OS | =3.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2017-7296 is classified as a medium severity vulnerability due to its potential to exploit persistent XSS attacks.
To fix CVE-2017-7296, update Contiki Operating System to the latest version where the vulnerability has been resolved.
CVE-2017-7296 is a Persistent XSS (Cross-Site Scripting) vulnerability found in the MQTT configuration page.
CVE-2017-7296 affects the Contiki Operating System version 3.0.
Yes, if exploited, CVE-2017-7296 can potentially allow attackers to steal sensitive data from users.