CVE-2021-35483

Medium
|4.1
No Exploit

Plain English Summary

AI-powered analysis for quick understanding

This vulnerability allows an attacker, who is already logged into the Nokia IMPACT system, to upload malicious JavaScript files that can be executed when other users visit the affected web page. The attacker can exploit this during the process of adding or editing applications, potentially leading to unauthorized actions on behalf of those users.

Technical Description

The Applications component of Nokia IMPACT version through 19.11.2.10-20210118042150283 allows an authenticated user to arbitrarily upload JavaScript files via the /ui/rest-proxy/application fileupload parameter. This can occur during the adding of a new application, or during the editing of an existing one. If an authenticated user visits the web page where the file is published, the JavaScript code is executed.

CVSS Vector Analysis

Attack VectorAdjacent Network
Attack ComplexityLow
Privileges RequiredLow
User InteractionRequired
Confidentiality ImpactLow
Integrity ImpactLow
Availability ImpactNone
ScopeUnchanged

Vector String

CVSS:3.1/AV:A/AC:L/PR:L/UI:R/S:U/C:L/I:L/A:N

Exploit Resources

Search for proof-of-concept code and exploit modules

Official References