Cross Site Scripting vulnerability in Sensaphone WEB600 Monitoring System v.1.6.5.H and before allows a remote attacker to execute arbitrary code via a crafted GET requests to /@.xml, placing payloads in the g7200, g7300, g4601, and g1F02 parameters.
The product does not neutralize or incorrectly neutralizes user-controllable input before it is placed in output that is used as a web page that is served to other users.
Link | Tags |
---|---|
https://github.com/tcbutler320/Sensaphone-WEB600-XSS | third party advisory |
https://sensaphone.com/products/sensaphone-web600-monitoring-system | product |
https://vulmon.com/vulnerabilitydetails?qid=CVE-2024-55040 | third party advisory |