漏洞标题
N/A
漏洞描述信息
在GatesAir Maxiva UAXT和VAXT发射机的基于Web的管理界面中存在会话劫持漏洞。未经身份验证的攻击者可以访问暴露的日志文件(/logs/debug/xteLog*),这可能导致敏感的会话相关信息(如会话ID(sess_id)和身份验证成功令牌(user_check_password OK))被泄露。利用此漏洞可能允许攻击者劫持活动会话,获得未授权访问,并提升受影响设备上的权限。
CVSS信息
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
漏洞类别
通过日志文件的信息暴露
漏洞标题
N/A
漏洞描述信息
A session hijacking vulnerability exists in the web-based management interface of GatesAir Maxiva UAXT, VAXT transmitters. Unauthenticated attackers can access exposed log files (/logs/debug/xteLog*), potentially revealing sensitive session-related information such as session IDs (sess_id) and authentication success tokens (user_check_password OK). Exploiting this flaw could allow attackers to hijack active sessions, gain unauthorized access, and escalate privileges on affected devices.
CVSS信息
N/A
漏洞类别
N/A