| Title | trimble SPS851 488.01 Cross Site Scripting |
|---|
| Description | It is possible to induce the application to open a pop-up containing session information through the injection of a reflected cross-site scripting (XSS) payload.
When accessing the application while authenticated, the "Ethernet Configuration" menu was accessed, and in the "Hostname" field, the payload '/alert(1)// was inserted. After interacting with the "Change Configuration" button, the pop-up generated by the payload was observed.
Vendor URL: https://help.fieldsystems.trimble.com/sps/home.htm
|
|---|
| Source | ⚠️ https://github.com/renanmalafatti/CVE/blob/main/CVE-2025-0220.md |
|---|
| User | Havook (UID 71104) |
|---|
| Submission | 12/17/2024 01:52 AM (1 Year ago) |
|---|
| Moderation | 01/04/2025 09:47 AM (18 days later) |
|---|
| Status | Accepted |
|---|
| VulDB entry | 290199 [Trimble SPS851 488.01 Ethernet Configuration Menu Hostname cross site scripting] |
|---|
| Points | 20 |
|---|