First published: Fri May 03 2024(Updated: )
NETGEAR ProSAFE Network Management System saveNodeLabel Cross-Site Scripting Privilege Escalation Vulnerability. This vulnerability allows remote attackers to escalate privileges on affected installations of NETGEAR ProSAFE Network Management System. Minimal user interaction is required to exploit this vulnerability. The specific flaw exists within the saveNodeLabel method. The issue results from the lack of proper validation of user-supplied data, which can lead to the injection of an arbitrary script. An attacker can leverage this vulnerability to escalate privileges to resources normally protected from the user. Was ZDI-CAN-21838.
Credit: zdi-disclosures@trendmicro.com
Affected Software | Affected Version | How to fix |
---|---|---|
Netgear ProSAFE Network Management Software 300 | ||
Netgear ProSAFE Network Management Software 300 | <1.7.0.31 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2023-50231 is classified as a high severity vulnerability due to its potential for privilege escalation.
To mitigate CVE-2023-50231, update the NETGEAR ProSAFE Network Management System to the latest version provided by NETGEAR.
CVE-2023-50231 allows remote attackers to escalate privileges, potentially compromising the security of affected installations.
Minimal user interaction is required to exploit CVE-2023-50231, making it easier for remote attackers to execute.
CVE-2023-50231 affects specific versions of NETGEAR ProSAFE Network Management System that are not patched against this vulnerability.