First published: Tue May 30 2023(Updated: )
An issue was discovered in Faronics Insight 10.0.19045 on Windows. Attacker-supplied input is not validated/sanitized before being rendered in both the Teacher and Student Console applications, enabling an attacker to execute JavaScript in these applications. Due to the rich and highly privileged functionality offered by the Teacher Console, the ability to silently exploit Cross Site Scripting (XSS) on the Teacher Machine enables remote code execution on any connected student machine (and the teacher's machine).
Credit: cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
All of | ||
Faronics Insight | =10.0.19045 | |
Microsoft Windows Operating System | ||
Faronics Insight | =10.0.19045 | |
Microsoft Windows Operating System |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2023-28350 is classified as a high severity vulnerability due to the potential for remote code execution via unvalidated input.
To fix CVE-2023-28350, update Faronics Insight to the latest version that addresses this vulnerability.
CVE-2023-28350 affects unvalidated attacker-supplied input rendered in both the Teacher and Student Console applications.
Yes, CVE-2023-28350 specifically affects Faronics Insight version 10.0.19045.
Exploiting CVE-2023-28350 can allow an attacker to execute arbitrary JavaScript in the affected applications, leading to data compromise or further attacks.