mirror of
https://github.com/CVEProject/cvelist.git
synced 2025-07-29 05:56:59 +00:00
104 lines
3.5 KiB
JSON
104 lines
3.5 KiB
JSON
{
|
|
"CVE_data_meta": {
|
|
"ASSIGNER": "cve-coordination@incibe.es",
|
|
"DATE_PUBLIC": "2022-11-03T09:00:00.000Z",
|
|
"ID": "CVE-2022-43980",
|
|
"STATE": "PUBLIC",
|
|
"TITLE": "Cross-site scripting vulnerability in the network maps edit functionality"
|
|
},
|
|
"affects": {
|
|
"vendor": {
|
|
"vendor_data": [
|
|
{
|
|
"product": {
|
|
"product_data": [
|
|
{
|
|
"product_name": "Pandora FMS",
|
|
"version": {
|
|
"version_data": [
|
|
{
|
|
"platform": "all",
|
|
"version_affected": "=",
|
|
"version_name": "v765",
|
|
"version_value": "v765"
|
|
}
|
|
]
|
|
}
|
|
}
|
|
]
|
|
},
|
|
"vendor_name": "Artica PFMS"
|
|
}
|
|
]
|
|
}
|
|
},
|
|
"data_format": "MITRE",
|
|
"data_type": "CVE",
|
|
"data_version": "4.0",
|
|
"description": {
|
|
"description_data": [
|
|
{
|
|
"lang": "eng",
|
|
"value": "There is a stored cross-site scripting vulnerability in Pandora FMS v765 in the network maps editing functionality. An attacker could modify a network map, including on purpose the name of an XSS payload. Once created, if a user with admin privileges clicks on the edited network maps, the XSS payload will be executed. The exploitation of this vulnerability could allow an atacker to steal the value of the admin user\u00b4s cookie."
|
|
}
|
|
]
|
|
},
|
|
"generator": {
|
|
"engine": "Vulnogram 0.0.9"
|
|
},
|
|
"impact": {
|
|
"cvss": {
|
|
"attackComplexity": "LOW",
|
|
"attackVector": "NETWORK",
|
|
"availabilityImpact": "NONE",
|
|
"baseScore": 5.2,
|
|
"baseSeverity": "MEDIUM",
|
|
"confidentialityImpact": "HIGH",
|
|
"integrityImpact": "LOW",
|
|
"privilegesRequired": "HIGH",
|
|
"scope": "UNCHANGED",
|
|
"userInteraction": "REQUIRED",
|
|
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:U/C:H/I:L/A:N",
|
|
"version": "3.1"
|
|
}
|
|
},
|
|
"problemtype": {
|
|
"problemtype_data": [
|
|
{
|
|
"description": [
|
|
{
|
|
"lang": "eng",
|
|
"value": "CWE-352 Cross-Site Request Forgery (CSRF)"
|
|
}
|
|
]
|
|
}
|
|
]
|
|
},
|
|
"references": {
|
|
"reference_data": [
|
|
{
|
|
"name": "https://pandorafms.com/en/security/common-vulnerabilities-and-exposures/",
|
|
"refsource": "CONFIRM",
|
|
"url": "https://pandorafms.com/en/security/common-vulnerabilities-and-exposures/"
|
|
},
|
|
{
|
|
"refsource": "MISC",
|
|
"name": "https://github.com/Argonx21/CVE-2022-43980",
|
|
"url": "https://github.com/Argonx21/CVE-2022-43980"
|
|
}
|
|
]
|
|
},
|
|
"solution": [
|
|
{
|
|
"lang": "eng",
|
|
"value": "Fixed in v766"
|
|
}
|
|
],
|
|
"source": {
|
|
"defect": [
|
|
"Ticket",
|
|
"4923"
|
|
],
|
|
"discovery": "EXTERNAL"
|
|
}
|
|
} |