vendor:
Radius Manager
by:
Check Point Software Technologies - Vulnerability Discovery Team (VDT)
6,4
CVSS
MEDIUM
Cross Site Scripting
79
CWE
Product Name: Radius Manager
Affected Version From: Radius Manager 3.8.0
Affected Version To: Radius Manager 3.8.0
Patch Exists: YES
Related CWE: CVE-2010-4275
CPE: a:check_point:radius_manager
Metasploit:
N/A
Other Scripts:
N/A
Tags: N/A
CVSS Metrics: N/A
Nuclei References:
N/A
Nuclei Metadata: N/A
Platforms Tested: None
2010
Radius Manager Multiple Cross Site Scripting Issues
Radius Manager is a centralized way for administration of Mikrotik, Cisco, Chillispot and StarOS routers and wireless access points. It has a centralized accounting system that uses Radius, provinding easy user and accounting management for ISP's. This problem was confirmed in the following versions of the Radius Manager, other versions maybe also affected. Radius Manager 3.8.0. The Radius Manager system is affected by Multiple Stored Cross Site Scripting. The “Group Name” and “Description” in “new_usergroup” menu do not sanitize input data, allowing attacker to store malicious javascript code in a page. The same thing occurs with “new_nas” menu.
Mitigation:
Input validation should be used to prevent malicious code from being stored in the application.