An information disclosure vulnerability exists in the web interface session cookie functionality of InHand Networks InRouter302 V3.5.4. The session cookie misses the HttpOnly flag, making it accessible via JavaScript and thus allowing an attacker, able to perform an XSS attack, to steal the session cookie.
The product uses a cookie to store sensitive information, but the cookie is not marked with the HttpOnly flag.
The product specifies permissions for a security-critical resource in a way that allows that resource to be read or modified by unintended actors.
Link | Tags |
---|---|
https://www.inhandnetworks.com/upload/attachment/202205/10/InHand-PSA-2022-01.pdf | vendor advisory |
https://talosintelligence.com/vulnerability_reports/TALOS-2022-1470 | exploit third party advisory technical description |