{ "id": "CVE-2022-2685", "sourceIdentifier": "cna@vuldb.com", "published": "2022-08-05T21:15:08.750", "lastModified": "2024-11-21T07:01:30.680", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A vulnerability was found in SourceCodester Interview Management System 1.0 and classified as problematic. This issue affects some unknown processing of the file /addQuestion.php. The manipulation of the argument question with the input leads to cross site scripting. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-205673 was assigned to this vulnerability." }, { "lang": "es", "value": "Se ha encontrado una vulnerabilidad en SourceCodester Interview Management System versi\u00f3n 1.0 y Ha sido clasificada como problem\u00e1tica. Este problema afecta a un procesamiento desconocido del archivo /addQuestion.php. La manipulaci\u00f3n del argumento question con el input (script)alert(1)(/script) conlleva a un ataque de tipo cross site scripting. El ataque puede ser iniciado remotamente. La explotaci\u00f3n ha sido divulgada al p\u00fablico y puede ser usada. El identificador VDB-205673 fue asignado a esta vulnerabilidad" } ], "metrics": { "cvssMetricV31": [ { "source": "cna@vuldb.com", "type": "Secondary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:N", "baseScore": 3.5, "baseSeverity": "LOW", "attackVector": "NETWORK", "attackComplexity": "LOW", "privilegesRequired": "LOW", "userInteraction": "REQUIRED", "scope": "UNCHANGED", "confidentialityImpact": "NONE", "integrityImpact": "LOW", "availabilityImpact": "NONE" }, "exploitabilityScore": 2.1, "impactScore": 1.4 }, { "source": "nvd@nist.gov", "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", "baseScore": 6.1, "baseSeverity": "MEDIUM", "attackVector": "NETWORK", "attackComplexity": "LOW", "privilegesRequired": "NONE", "userInteraction": "REQUIRED", "scope": "CHANGED", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "availabilityImpact": "NONE" }, "exploitabilityScore": 2.8, "impactScore": 2.7 } ] }, "weaknesses": [ { "source": "cna@vuldb.com", "type": "Primary", "description": [ { "lang": "en", "value": "CWE-79" } ] } ], "configurations": [ { "nodes": [ { "operator": "OR", "negate": false, "cpeMatch": [ { "vulnerable": true, "criteria": "cpe:2.3:a:interview_management_system_project:interview_management_system:1.0:*:*:*:*:*:*:*", "matchCriteriaId": "F4D79A53-B90E-4DD2-8821-14AE96E9EA69" } ] } ] } ], "references": [ { "url": "https://github.com/anx0ing/CVE_demo/blob/main/2022/Interview%20Management%20System-XSS.md", "source": "cna@vuldb.com", "tags": [ "Exploit", "Third Party Advisory" ] }, { "url": "https://github.com/anx0ing/CVE_demo/blob/main/2022/Interview%20Management%20System-XSS.md#interview-management-system-xss", "source": "cna@vuldb.com", "tags": [ "Exploit", "Third Party Advisory" ] }, { "url": "https://vuldb.com/?id.205673", "source": "cna@vuldb.com", "tags": [ "Third Party Advisory", "VDB Entry" ] }, { "url": "https://github.com/anx0ing/CVE_demo/blob/main/2022/Interview%20Management%20System-XSS.md", "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory" ] }, { "url": "https://github.com/anx0ing/CVE_demo/blob/main/2022/Interview%20Management%20System-XSS.md#interview-management-system-xss", "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory" ] }, { "url": "https://vuldb.com/?id.205673", "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory", "VDB Entry" ] } ] }