First published: Mon Nov 09 2020(Updated: )
The conferencing component on Mitel ShoreTel 19.46.1802.0 devices could allow an unauthenticated attacker to conduct a reflected cross-site scripting (XSS) attack (via the PATH_INFO to index.php) due to insufficient validation for the time_zone object in the HOME_MEETING& page.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Mitel Shoretel Firmware | =19.46.1802.0 | |
Mitel ShoreTel |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2020-28351 is classified as a medium severity vulnerability due to its potential for cross-site scripting attacks.
To fix CVE-2020-28351, you should apply the latest firmware updates from Mitel for affected ShoreTel devices.
CVE-2020-28351 affects users of Mitel ShoreTel firmware version 19.46.1802.0.
CVE-2020-28351 can be exploited via a reflected cross-site scripting (XSS) attack.
The primary cause of CVE-2020-28351 is insufficient validation of the time_zone object in the HOME_MEETING& page.