Arbitrary Code Execution via TemplateName Parameter in Nokia NetAct Administration of Measurements

Arbitrary Code Execution via TemplateName Parameter in Nokia NetAct Administration of Measurements

CVE-2022-28864 · HIGH Severity

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

An issue was discovered in Nokia NetAct 22 through the Administration of Measurements website section. A malicious user can edit or add the templateName parameter in order to include malicious code, which is then downloaded as a .csv or .xlsx file and executed on a victim machine. Here, the /aom/html/EditTemplate.jsf and /aom/html/ViewAllTemplatesPage.jsf templateName parameter is used.

Learn more about our Web App Pen Testing.