2024-12-08 03:06:42 +00:00

153 lines
4.9 KiB
JSON

{
"id": "CVE-2022-22795",
"sourceIdentifier": "cna@cyber.gov.il",
"published": "2022-03-10T17:45:37.500",
"lastModified": "2024-11-21T06:47:28.150",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Signiant - Manager+Agents XML External Entity (XXE) - Extract internal files of the affected machine An attacker can read all the system files, the product is running with root on Linux systems and nt/authority on windows systems, which allows him to access and extract any file on the systems, such as passwd, shadow, hosts and so on. By gaining access to these files, attackers can steal sensitive information from the victims machine."
},
{
"lang": "es",
"value": "Signiant - Manager+Agents un ataque de tipo XML External Entity (XXE) - Extraer archivos internos de la m\u00e1quina afectada Un atacante puede leer todos los archivos del sistema, el producto es ejecutado con root en sistemas Linux y nt/authority en sistemas Windows, lo que le permite acceder y extraer cualquier archivo de los sistemas, como passwd, shadow, hosts, etc. Al conseguir acceso a estos archivos, los atacantes pueden robar informaci\u00f3n confidencial de la m\u00e1quina de las v\u00edctimas"
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "cna@cyber.gov.il",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:P/AC:H/PR:H/UI:R/S:C/C:H/I:H/A:H",
"baseScore": 6.8,
"baseSeverity": "MEDIUM",
"attackVector": "PHYSICAL",
"attackComplexity": "HIGH",
"privilegesRequired": "HIGH",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 0.2,
"impactScore": 6.0
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H",
"baseScore": 9.1,
"baseSeverity": "CRITICAL",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 3.9,
"impactScore": 5.2
}
],
"cvssMetricV2": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "2.0",
"vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:P",
"baseScore": 6.4,
"accessVector": "NETWORK",
"accessComplexity": "LOW",
"authentication": "NONE",
"confidentialityImpact": "PARTIAL",
"integrityImpact": "NONE",
"availabilityImpact": "PARTIAL"
},
"baseSeverity": "MEDIUM",
"exploitabilityScore": 10.0,
"impactScore": 4.9,
"acInsufInfo": false,
"obtainAllPrivilege": false,
"obtainUserPrivilege": false,
"obtainOtherPrivilege": false,
"userInteractionRequired": false
}
]
},
"weaknesses": [
{
"source": "cna@cyber.gov.il",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-611"
}
]
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-611"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:signiant:manager\\+agents:*:*:*:*:*:*:*:*",
"versionEndExcluding": "13.5",
"matchCriteriaId": "19B2527F-AF1D-4272-A9C4-CD495E2F2F0C"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:signiant:manager\\+agents:14.0:*:*:*:*:*:*:*",
"matchCriteriaId": "90B2CEC8-2A06-46AD-A9F7-208CBAE18B95"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:signiant:manager\\+agents:15.0:*:*:*:*:*:*:*",
"matchCriteriaId": "92D6242F-F050-43D3-966D-0A77ED55520C"
}
]
}
]
}
],
"references": [
{
"url": "https://www.gov.il/en/departments/faq/cve_advisories",
"source": "cna@cyber.gov.il",
"tags": [
"Third Party Advisory"
]
},
{
"url": "https://www.gov.il/en/departments/faq/cve_advisories",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
]
}
]
}