cvelist/2022/4xxx/CVE-2022-4596.json
2022-12-18 12:00:42 +00:00

82 lines
2.9 KiB
JSON

{
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": {
"ID": "CVE-2022-4596",
"TITLE": "Shoplazza Add Blog Post cross site scripting",
"REQUESTER": "cna@vuldb.com",
"ASSIGNER": "cna@vuldb.com",
"STATE": "PUBLIC"
},
"generator": "vuldb.com",
"affects": {
"vendor": {
"vendor_data": [
{
"vendor_name": "",
"product": {
"product_data": [
{
"product_name": "Shoplazza",
"version": {
"version_data": [
{
"version_value": "1.1"
}
]
}
}
]
}
}
]
}
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "CWE-707 Improper Neutralization -> CWE-74 Injection -> CWE-79 Cross Site Scripting"
}
]
}
]
},
"description": {
"description_data": [
{
"lang": "eng",
"value": "A vulnerability, which was classified as problematic, has been found in Shoplazza 1.1. This issue affects some unknown processing of the file /admin/api/admin/articles/ of the component Add Blog Post Handler. The manipulation of the argument Title leads to cross site scripting. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-216191."
}
]
},
"impact": {
"cvss": {
"version": "3.1",
"baseScore": "3.5",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:N"
}
},
"references": {
"reference_data": [
{
"url": "https://seclists.org/fulldisclosure/2022/Dec/11",
"refsource": "MISC",
"name": "https://seclists.org/fulldisclosure/2022/Dec/11"
},
{
"url": "https://seclists.org/fulldisclosure/2022/Dec/att-11/proof-of-concept-shoplazza.txt",
"refsource": "MISC",
"name": "https://seclists.org/fulldisclosure/2022/Dec/att-11/proof-of-concept-shoplazza.txt"
},
{
"url": "https://vuldb.com/?id.216191",
"refsource": "MISC",
"name": "https://vuldb.com/?id.216191"
}
]
}
}