Arbitrary Code Execution through Filename Manipulation in Nokia NetAct Site Configuration Tool

Arbitrary Code Execution through Filename Manipulation in Nokia NetAct Site Configuration Tool

CVE-2022-28865 · MEDIUM Severity

CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N

An issue was discovered in Nokia NetAct 22 through the Site Configuration Tool website section. A malicious user can change a filename of an uploaded file to include JavaScript code, which is then stored and executed by a victim's web browser. The most common mechanism for delivering malicious content is to include it as a parameter in a URL that is posted publicly or e-mailed directly to victims. Here, the /netact/sct filename parameter is used.

Learn more about our Web App Pen Testing.