Arbitrary Code Execution via Filename Manipulation in Nokia NetAct 18A

Arbitrary Code Execution via Filename Manipulation in Nokia NetAct 18A

CVE-2021-26596 · MEDIUM Severity

CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N

An issue was discovered in Nokia NetAct 18A. A malicious user can change a filename of an uploaded file to include JavaScript code, which is then stored and executed by a victim's web browser. The most common mechanism for delivering malicious content is to include it as a parameter in a URL that is posted publicly or e-mailed directly to victims. Here, the /netact/sct filename parameter is used.

Learn more about our Web App Pen Testing.