83 lines
2.1 KiB
JSON
Raw Normal View History

2023-04-24 12:24:31 +02:00
{
"id": "CVE-2022-42746",
"sourceIdentifier": "help@fluidattacks.com",
"published": "2022-11-03T20:15:32.503",
"lastModified": "2023-01-26T20:20:13.523",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
"value": "CandidATS version 3.0.0 on 'indexFile' of the 'ajax.php' resource, allows an external attacker to steal the cookie of arbitrary users. This is possible because the application application does not properly validate user input against XSS attacks."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE",
"baseScore": 6.1,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.8,
"impactScore": 2.7
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-79"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:auieo:candidats:3.0.0:-:*:*:*:*:*:*",
"matchCriteriaId": "49FA43A5-7FB5-4E3A-8530-06C2BC31B078"
}
]
}
]
}
],
"references": [
{
"url": "https://candidats.net/",
"source": "help@fluidattacks.com",
"tags": [
"Product"
]
},
{
"url": "https://fluidattacks.com/advisories/modestep/",
"source": "help@fluidattacks.com",
"tags": [
"Exploit",
"Third Party Advisory"
]
}
]
}