Title | trimble SPS851 488.01 Cross Site Scripting |
---|
Description | It is possible to induce the application to open a pop-up containing session information through the injection of a reflected cross-site scripting (XSS) payload.
When accessing the application while authenticated, the "Ethernet Configuration" menu was accessed, and in the "Hostname" field, the payload '/alert(1)// was inserted. After interacting with the "Change Configuration" button, the pop-up generated by the payload was observed.
Vendor URL: https://help.fieldsystems.trimble.com/sps/home.htm
|
---|
Source | ⚠️ https://github.com/renanmalafatti/CVE/blob/main/CVE-2025-0220.md |
---|
User | Havook (UID 71104) |
---|
Submission | 17/12/2024 01:52 (il y a 1 mois) |
---|
Moderation | 04/01/2025 09:47 (18 days later) |
---|
Status | Accepté |
---|
VulDB Entry | 290199 [Trimble SPS851 488.01 Ethernet Configuration Menu Hostname cross site scripting] |
---|
Points | 20 |
---|