{ "id": "CVE-2022-39813", "sourceIdentifier": "cve@mitre.org", "published": "2023-01-27T22:15:08.470", "lastModified": "2024-11-21T07:18:18.397", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Italtel NetMatch-S CI 5.2.0-20211008 allows Multiple Reflected/Stored XSS issues under NMSCIWebGui/j_security_check via the j_username parameter, or NMSCIWebGui/actloglineview.jsp via the name or actLine parameter. An attacker leveraging this vulnerability could inject arbitrary JavaScript. The payload would then be triggered every time an authenticated user browses the page containing it." }, { "lang": "es", "value": "Italtel NetMatch-S CI 5.2.0-20211008 sufre de m\u00faltiples problemas XSS reflejados/almacenados en NMSCIWebGui/j_security_check a trav\u00e9s del par\u00e1metro j_username, o NMSCIWebGui/actloglineview.jsp a trav\u00e9s del par\u00e1metro nombre o actLine. Un atacante que aproveche esta vulnerabilidad podr\u00eda inyectar JavaScript arbitrario. El payload se activar\u00e1 cada vez que un usuario autenticado navegue por la p\u00e1gina que la contiene." } ], "metrics": { "cvssMetricV31": [ { "source": "nvd@nist.gov", "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", "baseScore": 6.1, "baseSeverity": "MEDIUM", "attackVector": "NETWORK", "attackComplexity": "LOW", "privilegesRequired": "NONE", "userInteraction": "REQUIRED", "scope": "CHANGED", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "availabilityImpact": "NONE" }, "exploitabilityScore": 2.8, "impactScore": 2.7 } ] }, "weaknesses": [ { "source": "nvd@nist.gov", "type": "Primary", "description": [ { "lang": "en", "value": "CWE-79" } ] } ], "configurations": [ { "nodes": [ { "operator": "OR", "negate": false, "cpeMatch": [ { "vulnerable": true, "criteria": "cpe:2.3:a:italtel:netmatch-s_ci:5.2.0-20211008:*:*:*:*:*:*:*", "matchCriteriaId": "59CAE053-D0CC-468D-9795-26575CD63425" } ] } ] } ], "references": [ { "url": "https://www.gruppotim.it/it/footer/red-team.html", "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ] }, { "url": "https://www.gruppotim.it/it/footer/red-team.html", "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory" ] } ] }