mirror of
https://github.com/fkie-cad/nvd-json-data-feeds.git
synced 2025-05-29 01:31:20 +00:00
81 lines
3.5 KiB
JSON
81 lines
3.5 KiB
JSON
{
|
|
"id": "CVE-2022-34322",
|
|
"sourceIdentifier": "cve@mitre.org",
|
|
"published": "2023-01-01T08:15:10.007",
|
|
"lastModified": "2023-01-09T16:16:09.550",
|
|
"vulnStatus": "Analyzed",
|
|
"descriptions": [
|
|
{
|
|
"lang": "en",
|
|
"value": "Multiple XSS issues were discovered in Sage Enterprise Intelligence 2021 R1.1 that allow an attacker to execute JavaScript code in the context of users' browsers. The attacker needs to be authenticated to reach the vulnerable features. An issue is present in the Notify Users About Modification menu and the Notifications feature. A user can send malicious notifications and execute JavaScript code in the browser of every user who has enabled notifications. This is a stored XSS, and can lead to privilege escalation in the context of the application. (Another issue is present in the Favorites tab. The name of a favorite or a folder of favorites is interpreted as HTML, and can thus embed JavaScript code, which is executed when displayed. This is a self-XSS.)"
|
|
},
|
|
{
|
|
"lang": "es",
|
|
"value": "Se descubrieron m\u00faltiples problemas XSS en Sage Enterprise Intelligence 2021 R1.1 que permiten a un atacante ejecutar c\u00f3digo JavaScript en el contexto de los navegadores de los usuarios. El atacante debe autenticarse para acceder a las funciones vulnerables. Hay un problema en el men\u00fa Notificar a los usuarios sobre la modificaci\u00f3n y en la funci\u00f3n Notificaciones. Un usuario puede enviar notificaciones maliciosas y ejecutar c\u00f3digo JavaScript en el navegador de cada usuario que haya habilitado las notificaciones. Este es un XSS almacenado y puede provocar una escalada de privilegios en el contexto de la aplicaci\u00f3n. (Otro problema est\u00e1 presente en la pesta\u00f1a Favoritos. El nombre de un favorito o una carpeta de favoritos se interpreta como HTML y, por lo tanto, puede incrustar c\u00f3digo JavaScript, que se ejecuta cuando se muestra. Este es un XSS propio)."
|
|
}
|
|
],
|
|
"metrics": {
|
|
"cvssMetricV31": [
|
|
{
|
|
"source": "nvd@nist.gov",
|
|
"type": "Primary",
|
|
"cvssData": {
|
|
"version": "3.1",
|
|
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:H/I:H/A:H",
|
|
"attackVector": "NETWORK",
|
|
"attackComplexity": "LOW",
|
|
"privilegesRequired": "LOW",
|
|
"userInteraction": "REQUIRED",
|
|
"scope": "CHANGED",
|
|
"confidentialityImpact": "HIGH",
|
|
"integrityImpact": "HIGH",
|
|
"availabilityImpact": "HIGH",
|
|
"baseScore": 9.0,
|
|
"baseSeverity": "CRITICAL"
|
|
},
|
|
"exploitabilityScore": 2.3,
|
|
"impactScore": 6.0
|
|
}
|
|
]
|
|
},
|
|
"weaknesses": [
|
|
{
|
|
"source": "nvd@nist.gov",
|
|
"type": "Primary",
|
|
"description": [
|
|
{
|
|
"lang": "en",
|
|
"value": "CWE-79"
|
|
}
|
|
]
|
|
}
|
|
],
|
|
"configurations": [
|
|
{
|
|
"nodes": [
|
|
{
|
|
"operator": "OR",
|
|
"negate": false,
|
|
"cpeMatch": [
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:sage:sage_enterprise_intelligence:2021_r1.1:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "30A281FC-6EB6-451B-9B09-6B76E3279916"
|
|
}
|
|
]
|
|
}
|
|
]
|
|
}
|
|
],
|
|
"references": [
|
|
{
|
|
"url": "https://www.synacktiv.com/sites/default/files/2022-12/sage_sei_multiple_xss.pdf",
|
|
"source": "cve@mitre.org",
|
|
"tags": [
|
|
"Exploit",
|
|
"Technical Description",
|
|
"Third Party Advisory"
|
|
]
|
|
}
|
|
]
|
|
} |