First published: Sun Jul 25 2021(Updated: )
Cross Site Scripting (XSS) exists in NCH Axon PBX v2.22 and earlier via /ipblacklist?errorip= (reflected).
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Nchsoftware Axon Pbx | <=2.22 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2021-37462 is a vulnerability that exists in NCH Axon PBX v2.22 and earlier, allowing for Cross Site Scripting (XSS) attacks via the /ipblacklist?errorip= parameter.
CVE-2021-37462 has a severity rating of medium, with a CVSS score of 5.4.
CVE-2021-37462 allows an attacker to inject malicious scripts into the NCH Axon PBX web application through the /ipblacklist?errorip= parameter, potentially leading to unauthorized access or data theft.
At the moment, there is no official fix or patch available for CVE-2021-37462. It is recommended to implement mitigation measures, such as input sanitization, to prevent potential XSS attacks.
Additional information about CVE-2021-37462 can be found on the official NCH Axon PBX website (https://www.nch.com.au/pbx/index.html) and the associated GitHub repository (https://github.com/0xfml/poc/blob/main/NCH/Axon_2.22_XSS.md).