First published: Mon Jul 24 2023(Updated: )
An issue was discovered in Nokia NetAct 22 through the Administration of Measurements website section. A malicious user can edit or add the templateName parameter in order to include JavaScript code, which is then stored and executed by a victim's web browser. The most common mechanism for delivering malicious content is to include it as a parameter in a URL that is posted publicly or e-mailed directly to victims. Here, the /aom/html/EditTemplate.jsf and /aom/html/ViewAllTemplatesPage.jsf templateName parameter is used.
Credit: cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Nokia NetAct | =22.0.0.62 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2022-28867 is an issue discovered in Nokia NetAct 22 through the Administration of Measurements website section, allowing a malicious user to execute JavaScript code in a victim's web browser.
A malicious user can exploit CVE-2022-28867 by editing or adding the templateName parameter in order to include JavaScript code, which is then executed by a victim's web browser.
CVE-2022-28867 has a severity level of medium.
Nokia NetAct version 22.0.0.62 is affected by CVE-2022-28867.
To fix CVE-2022-28867, it is recommended to apply the latest security patches or updates provided by Nokia for NetAct version 22.0.0.62.