First published: Mon Jun 17 2019(Updated: )
An issue was discovered on Vera VeraEdge 1.7.19 and Veralite 1.7.481 devices. The device provides a shell script called connect.sh which is supposed to return a specific cookie for the user when the user is authenticated to https://home.getvera.com. One of the parameters retrieved by this script is "RedirectURL". However, the application lacks strict input validation of this parameter and this allows an attacker to execute the client-side code on this application.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Getvera Vera Edge Firmware | <=1.7.19 | |
Getvera Vera Edge | ||
VeraLite Firmware | <=1.7.481 | |
MiCasaVerde VeraLite |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID of this issue is CVE-2017-9390.
The severity of CVE-2017-9390 is medium with a CVSS score of 6.1.
Vera VeraEdge 1.7.19 and Veralite 1.7.481 devices are affected by CVE-2017-9390.
An attacker can exploit this vulnerability by performing XSS (Cross-Site Scripting) and command injection attacks.
There may not be any official fixes available for CVE-2017-9390, but it is recommended to update the firmware of the affected devices to the latest version and apply any patches or mitigations provided by the vendor.