First published: Mon Jul 24 2023(Updated: )
An issue was discovered in Nokia NetAct 22 through the Administration of Measurements website section. A malicious user can edit or add the templateName parameter in order to include malicious code, which is then downloaded as a .csv or .xlsx file and executed on a victim machine. Here, the /aom/html/EditTemplate.jsf and /aom/html/ViewAllTemplatesPage.jsf templateName parameter is used.
Credit: cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Nokia NetAct | =22.0.0.62 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of CVE-2022-28864 is high.
A malicious user can exploit CVE-2022-28864 by editing or adding the templateName parameter in order to include malicious code, which is then downloaded and executed on a victim machine.
The Nokia NetAct software version 22.0.0.62 is affected by CVE-2022-28864.
Yes, you can find more information about CVE-2022-28864 at the following references: [reference 1](https://www.gruppotim.it/it/footer/red-team.html), [reference 2](https://www.telecomitalia.com/tit/it/innovazione/cybersecurity/red-team.html).
The Common Weakness Enumeration (CWE) ID associated with CVE-2022-28864 is CWE-1236.