Description
|
|
A vulnerability has been reported in Aerohive HiveOS, which can be exploited by malicious people to conduct cross-site scripting attacks.
Input passed via the "ERROR_INFO" GET parameter to index.php5 is not properly sanitised before being returned to the user. This can be exploited to execute arbitrary HTML and script code in a user's browser session in context of an affected site.
The vulnerability is reported in versions 6.1r3b and prior running on Aerohive Access Points and Branch Routers.
|
|
|
|
Vulnerable Products
|
|
Vulnerable OS: Aerohive HiveOSVulnerable Software:
|
|
|
|
Solution
|
|
Update to version 6.1r5 or later.
|
|
|
|
CVE
|
|
|
|
|
|
References
|
|
http://www.exploit-db.com/exploits/34038/
|
|
|
|
Vulnerability Manager Detection
|
|
No
|
|
|
|
IPS Protection
|
|
|
|
|
|