In Solstice Pod before 3.0.3, the web services allow users to connect to them over unencrypted channels via the Browser Look-in feature. An attacker suitably positioned to view a legitimate user's network traffic could record and monitor their interactions with the web services and obtain any information the user supplies, including Administrator passwords and screen keys.
The product transmits sensitive or security-critical data in cleartext in a communication channel that can be sniffed by unauthorized actors.
Link | Tags |
---|---|
https://documentation.mersive.com/content/pages/release-notes.htm | release notes vendor advisory |
https://www.mersive.com/uk/products/solstice/ | product vendor advisory |
https://github.com/aress31/solstice-pod-cves | third party advisory exploit |