cvelist/2022/22xxx/CVE-2022-22795.json
2022-03-10 17:28:38 +00:00

115 lines
4.1 KiB
JSON

{
"CVE_data_meta": {
"ASSIGNER": "cna@cyber.gov.il",
"DATE_PUBLIC": "2022-03-02T16:21:00.000Z",
"ID": "CVE-2022-22795",
"STATE": "PUBLIC",
"TITLE": "Signiant - Manager+Agents XML External Entity (XXE)"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "Signiant",
"version": {
"version_data": [
{
"version_name": "Signiant ",
"version_value": "Build 78045 13.5.0 "
},
{
"version_name": "Signiant ",
"version_value": "Build 79008,14.0.0"
},
{
"version_name": "Signiant ",
"version_value": "Build 79687 14.1.0"
},
{
"version_name": "Signiant ",
"version_value": "Build 79687 15.0.0 "
}
]
}
}
]
},
"vendor_name": "Signiant"
}
]
}
},
"credit": [
{
"lang": "eng",
"value": "Anton Golotin"
}
],
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "Signiant - Manager+Agents XML External Entity (XXE) - Extract internal files of the affected machine An attacker can read all the system files, the product is running with root on Linux systems and nt/authority on windows systems, which allows him to access and extract any file on the systems, such as passwd, shadow, hosts and so on. By gaining access to these files, attackers can steal sensitive information from the victims machine."
}
]
},
"generator": {
"engine": "Vulnogram 0.0.9"
},
"impact": {
"cvss": {
"attackComplexity": "HIGH",
"attackVector": "PHYSICAL",
"availabilityImpact": "HIGH",
"baseScore": 6.8,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "HIGH",
"scope": "CHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:P/AC:H/PR:H/UI:R/S:C/C:H/I:H/A:H",
"version": "3.1"
}
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "CWE-611 Improper Restriction of XML External Entity Reference ('XXE')"
}
]
}
]
},
"references": {
"reference_data": [
{
"refsource": "MISC",
"url": "https://www.gov.il/en/departments/faq/cve_advisories",
"name": "https://www.gov.il/en/departments/faq/cve_advisories"
}
]
},
"solution": [
{
"lang": "eng",
"value": "All of 13.5, 14.1, and 15.1 have an update available.\nThe mitigation involved adding a filter that validates for external dtd."
}
],
"source": {
"advisory": "ILVN-2022-0016",
"defect": [
"ILVN-2022-0016"
],
"discovery": "EXTERNAL"
}
}