A vulnerability in the web-based interface of the RUCKUS Cloudpath product on version 5.12 build 5538 or before to could allow a remote, unauthenticated attacker to execute persistent XSS and CSRF attacks against a user of the admin management interface. A successful attack, combined with a certain admin activity, could allow the attacker to gain full admin privileges on the exploited system.
The product does not neutralize or incorrectly neutralizes user-controllable input before it is placed in output that is used as a web page that is served to other users.
Link | Tags |
---|---|
http://ruckus.com | not applicable |
https://server.cloudpath/ | broken link |
https://server.cloudpath/admin/enrollmentData/ | broken link |
https://github.com/harry935/CVE-2023-45992 | third party advisory exploit |
https://support.ruckuswireless.com/security_bulletins/322 | vendor advisory |