{ "id": "CVE-2022-29597", "sourceIdentifier": "cve@mitre.org", "published": "2022-06-02T18:15:09.643", "lastModified": "2024-11-21T06:59:23.660", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Solutions Atlantic Regulatory Reporting System (RRS) v500 is vulnerable to Local File Inclusion (LFI). Any authenticated user has the ability to reference internal system files within requests made to the RRSWeb/maint/ShowDocument/ShowDocument.aspx page. The server will successfully respond with the file contents of the internal system file requested. This ability could allow for adversaries to extract sensitive data and/or files from the underlying file system, gain knowledge about the internal workings of the system, or access source code of the application." }, { "lang": "es", "value": "Solutions Atlantic Regulatory Reporting System (RRS) versi\u00f3n v500, es vulnerable a una inclusi\u00f3n de archivos locales (LFI). Cualquier usuario autenticado presenta la capacidad de hacer referencia a archivos internos del sistema dentro de las peticiones realizadas a la p\u00e1gina RRSWeb/maint/ShowDocument/ShowDocument.aspx. El servidor responder\u00e1 con \u00e9xito con el contenido del archivo del sistema interno solicitado. Esta capacidad podr\u00eda permitir a adversarios extraer datos y/o archivos confidenciales del sistema de archivos subyacente, conseguir conocimientos sobre el funcionamiento interno del sistema o acceder al c\u00f3digo fuente de la aplicaci\u00f3n" } ], "metrics": { "cvssMetricV31": [ { "source": "nvd@nist.gov", "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", "baseScore": 6.5, "baseSeverity": "MEDIUM", "attackVector": "NETWORK", "attackComplexity": "LOW", "privilegesRequired": "LOW", "userInteraction": "NONE", "scope": "UNCHANGED", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "availabilityImpact": "NONE" }, "exploitabilityScore": 2.8, "impactScore": 3.6 } ], "cvssMetricV2": [ { "source": "nvd@nist.gov", "type": "Primary", "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:S/C:P/I:N/A:N", "baseScore": 4.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "SINGLE", "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.0, "impactScore": 2.9, "acInsufInfo": false, "obtainAllPrivilege": false, "obtainUserPrivilege": false, "obtainOtherPrivilege": false, "userInteractionRequired": false } ] }, "weaknesses": [ { "source": "nvd@nist.gov", "type": "Primary", "description": [ { "lang": "en", "value": "CWE-22" } ] } ], "configurations": [ { "nodes": [ { "operator": "OR", "negate": false, "cpeMatch": [ { "vulnerable": true, "criteria": "cpe:2.3:a:solutions-atlantic:regulatory_reporting_system:500:*:*:*:*:*:*:*", "matchCriteriaId": "BAE208E6-4BE4-438A-80A2-2B391203CBB5" } ] } ] } ], "references": [ { "url": "https://github.com/TheGetch/CVE-2022-29597", "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ] }, { "url": "https://solutions-atlantic.com/rrs/", "source": "cve@mitre.org", "tags": [ "Product" ] }, { "url": "https://github.com/TheGetch/CVE-2022-29597", "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory" ] }, { "url": "https://solutions-atlantic.com/rrs/", "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Product" ] } ] }