CVE-2018-5071
 
Severity Score
Exploit Likelihood
Affected Versions
Public Exploits
1Exploited in Wild
-Decision
Descriptions
Persistent XSS exists in the web server on Cobham Sea Tel 116 build 222429 satellite communication system devices: remote attackers can inject malicious JavaScript code using the device's TELNET shell built-in commands, as demonstrated by the "set ship name" command. This is similar to a Cross Protocol Injection with SNMP.
Existe Cross-Site Scripting (XSS) persistente en el servidor web en los dispositivos de sistema de comunicación por satélite Cobham Sea Tel 116 build 222429. Los atacantes remotos pueden inyectar código JavaScript malicioso utilizando los comandos shell TELNET integrados del dispositivo, tal y como queda demostrado con el comando "set ship name". Esto es similar a la inyección de protocolos cruzados con SNMP.
CVSS Scores
SSVC
- Decision:-
Timeline
- 2018-01-03 CVE Reserved
- 2018-01-08 CVE Published
- 2024-08-05 CVE Updated
- 2024-08-05 First Exploit
- 2024-12-17 EPSS Updated
- ---------- Exploited in Wild
- ---------- KEV Due Date
CWE
- CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
CAPEC
References (1)
URL | Tag | Source |
---|
URL | Date | SRC |
---|---|---|
http://misteralfa-hack.blogspot.cl/2018/01/seatelcobham-terminales-satelitales.html | 2024-08-05 |
URL | Date | SRC |
---|
URL | Date | SRC |
---|
Affected Vendors, Products, and Versions
Vendor | Product | Version | Other | Status | ||||||
---|---|---|---|---|---|---|---|---|---|---|
Vendor | Product | Version | Other | Status | <-- --> | Vendor | Product | Version | Other | Status |
Cobham Search vendor "Cobham" | Sea Tel 116 Firmware Search vendor "Cobham" for product "Sea Tel 116 Firmware" | 222429 Search vendor "Cobham" for product "Sea Tel 116 Firmware" and version "222429" | - |
Affected
| in | Cobham Search vendor "Cobham" | Sea Tel 116 Search vendor "Cobham" for product "Sea Tel 116" | - | - |
Safe
|