{ "id": "CVE-2022-32225", "sourceIdentifier": "support@hackerone.com", "published": "2022-07-14T15:15:08.543", "lastModified": "2024-11-21T07:05:57.700", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A reflected DOM-Based XSS vulnerability has been discovered in the Help directory of Veeam Management Pack for Microsoft System Center 8.0. This vulnerability could be exploited by an attacker by convincing a legitimate user to visit a crafted URL on a Veeam Management Pack for Microsoft System Center server, allowing for the execution of arbitrary scripts." }, { "lang": "es", "value": "Se ha detectado una vulnerabilidad de tipo XSS basada en DOM reflejado en el directorio de ayuda de Veeam Management Pack for Microsoft System Center versi\u00f3n 8.0. Esta vulnerabilidad podr\u00eda ser explotada por un atacante al convencer a un usuario leg\u00edtimo de visitar una URL dise\u00f1ada en un servidor de Veeam Management Pack for Microsoft System Center, permitiendo una ejecuci\u00f3n de scripts arbitrarios" } ], "metrics": { "cvssMetricV31": [ { "source": "nvd@nist.gov", "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", "baseScore": 6.1, "baseSeverity": "MEDIUM", "attackVector": "NETWORK", "attackComplexity": "LOW", "privilegesRequired": "NONE", "userInteraction": "REQUIRED", "scope": "CHANGED", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "availabilityImpact": "NONE" }, "exploitabilityScore": 2.8, "impactScore": 2.7 } ] }, "weaknesses": [ { "source": "support@hackerone.com", "type": "Secondary", "description": [ { "lang": "en", "value": "CWE-79" } ] }, { "source": "nvd@nist.gov", "type": "Primary", "description": [ { "lang": "en", "value": "CWE-79" } ] } ], "configurations": [ { "nodes": [ { "operator": "OR", "negate": false, "cpeMatch": [ { "vulnerable": true, "criteria": "cpe:2.3:a:veeam:management_pack:8.0:*:*:*:*:microsoft_system_center:*:*", "matchCriteriaId": "DD5EDC62-C98F-41FB-A46D-EC57029B5160" } ] } ] } ], "references": [ { "url": "https://www.veeam.com/kb4338", "source": "support@hackerone.com", "tags": [ "Patch", "Vendor Advisory" ] }, { "url": "https://www.veeam.com/kb4338", "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ] } ] }