mirror of
https://github.com/CVEProject/cvelist.git
synced 2025-08-04 08:44:25 +00:00
110 lines
4.2 KiB
JSON
110 lines
4.2 KiB
JSON
{
|
|
"CVE_data_meta": {
|
|
"ASSIGNER": "cna@cyber.gov.il",
|
|
"DATE_PUBLIC": "2022-05-09T11:39:00.000Z",
|
|
"ID": "CVE-2022-23165",
|
|
"STATE": "PUBLIC",
|
|
"TITLE": "Sysaid \u2013 Sysaid 14.2.0 Reflected Cross-Site Scripting (XSS)"
|
|
},
|
|
"affects": {
|
|
"vendor": {
|
|
"vendor_data": [
|
|
{
|
|
"product": {
|
|
"product_data": [
|
|
{
|
|
"product_name": "Sysaid ",
|
|
"version": {
|
|
"version_data": [
|
|
{
|
|
"platform": "cloud",
|
|
"version_affected": "<=",
|
|
"version_name": "22.2.19 cloud version",
|
|
"version_value": "22.2.19"
|
|
},
|
|
{
|
|
"platform": "on premise",
|
|
"version_affected": "<=",
|
|
"version_name": "22.1.63 on premise version",
|
|
"version_value": "22.1.63"
|
|
}
|
|
]
|
|
}
|
|
}
|
|
]
|
|
},
|
|
"vendor_name": "SysAid "
|
|
}
|
|
]
|
|
}
|
|
},
|
|
"credit": [
|
|
{
|
|
"lang": "eng",
|
|
"value": "Robert Catalin Raducioiu,, Francesco Di Castri"
|
|
}
|
|
],
|
|
"data_format": "MITRE",
|
|
"data_type": "CVE",
|
|
"data_version": "4.0",
|
|
"description": {
|
|
"description_data": [
|
|
{
|
|
"lang": "eng",
|
|
"value": "Sysaid \u2013 Sysaid 14.2.0 Reflected Cross-Site Scripting (XSS) - The parameter \"helpPageName\" used by the page \"/help/treecontent.jsp\" suffers from a Reflected Cross-Site Scripting vulnerability. For an attacker to exploit this Cross-Site Scripting vulnerability, it's necessary for the affected product to expose the Offline Help Pages. An attacker may gain access to sensitive information or execute client-side code in the browser session of the victim user. Furthermore, an attacker would require the victim to open a malicious link. An attacker may exploit this vulnerability in order to perform phishing attacks. The attacker can receive sensitive data like server details, usernames, workstations, etc. He can also perform actions such as uploading files, deleting calls from the system"
|
|
}
|
|
]
|
|
},
|
|
"generator": {
|
|
"engine": "Vulnogram 0.0.9"
|
|
},
|
|
"impact": {
|
|
"cvss": {
|
|
"attackComplexity": "HIGH",
|
|
"attackVector": "LOCAL",
|
|
"availabilityImpact": "LOW",
|
|
"baseScore": 5.5,
|
|
"baseSeverity": "MEDIUM",
|
|
"confidentialityImpact": "HIGH",
|
|
"integrityImpact": "LOW",
|
|
"privilegesRequired": "LOW",
|
|
"scope": "UNCHANGED",
|
|
"userInteraction": "REQUIRED",
|
|
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:L/A:L",
|
|
"version": "3.1"
|
|
}
|
|
},
|
|
"problemtype": {
|
|
"problemtype_data": [
|
|
{
|
|
"description": [
|
|
{
|
|
"lang": "eng",
|
|
"value": "CWE-79 Cross-site Scripting (XSS)"
|
|
}
|
|
]
|
|
}
|
|
]
|
|
},
|
|
"references": {
|
|
"reference_data": [
|
|
{
|
|
"refsource": "MISC",
|
|
"url": "https://www.gov.il/en/departments/faq/cve_advisories",
|
|
"name": "https://www.gov.il/en/departments/faq/cve_advisories"
|
|
}
|
|
]
|
|
},
|
|
"solution": [
|
|
{
|
|
"lang": "eng",
|
|
"value": "Update to 22.2.20 cloud version, or to 22.1.64 on premise version."
|
|
}
|
|
],
|
|
"source": {
|
|
"defect": [
|
|
"ILVN-2022-0020"
|
|
],
|
|
"discovery": "EXTERNAL"
|
|
}
|
|
} |