Stored cross-site scripting in Vantage Velocity - CVE-2020-9025

 

Stored cross-site scripting in Vantage Velocity - CVE-2020-9025

Published: February 17, 2020


Vulnerability identifier: #VU25405
CSH Severity: Low
CVSS v4.0: CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:N/SC:L/SI:L/SA:N/E:U/U:Clear
CVE-ID: CVE-2020-9025
CWE-ID: CWE-79
Exploitation vector: Remote access
Exploit availability: No public exploit available
Vendor: Iteris, Inc.
Affected software:
Vantage Velocity

Detailed vulnerability description

The disclosed vulnerability allows a remote attacker to perform cross-site scripting (XSS) attacks.

The vulnerability exists due to insufficient sanitization of user-supplied data in all parameters of the Start Data Viewer feature of the "/cgi-bin/loaddata.py" script. A remote attacker can permanently inject and execute arbitrary HTML and script code in user's browser in context of vulnerable website.

Successful exploitation of this vulnerability may allow a remote attacker to steal potentially sensitive information, change appearance of the web page, perform phishing and drive-by-download attacks.

This vulnerability affects the following parameters:

  • htmlBluetoothReaderId
  • htmlDataOutputFile
  • htmlMacAddressResendTimeSeconds
  • htmlSelectEnableUdpOutput
  • htmlUdpOutputHost
  • htmlUdpOutputPort
  • htmlSelectRestartOnCommFailure
  • htmlSelectAnonymizeMacAddresses
  • htmlWifiChannelScan
  • htmlSelectEnableHeartbeatMessage
  • htmlSelectEnableBluetoothCapture
  • htmlSelectEnableWifiCapture
  • htmlAuthenticate
  • htmlLogin
  • htmlPassword
  • htmlLoggedIn



How to mitigate CVE-2020-9025

Cybersecurity Help is currently unaware of any official solution to address this vulnerability..

Sources