mirror of
https://github.com/fkie-cad/nvd-json-data-feeds.git
synced 2025-05-28 01:02:25 +00:00
155 lines
5.6 KiB
JSON
155 lines
5.6 KiB
JSON
{
|
|
"id": "CVE-2022-34914",
|
|
"sourceIdentifier": "cve@mitre.org",
|
|
"published": "2022-07-08T19:15:08.640",
|
|
"lastModified": "2024-11-21T07:10:25.673",
|
|
"vulnStatus": "Modified",
|
|
"cveTags": [],
|
|
"descriptions": [
|
|
{
|
|
"lang": "en",
|
|
"value": "Webswing before 22.1.3 allows X-Forwarded-For header injection. The client IP address is associated with a variable in the configuration page. The {clientIp} variable can be used as an application startup argument. The X-Forwarded-For header can be manipulated by a client to store an arbitrary value that is used to replace the clientIp variable (without sanitization). A client can thus inject multiple arguments into the session startup. Systems that do not use the clientIP variable in the configuration are not vulnerable. The vulnerability is fixed in these versions: 20.1.16, 20.2.19, 21.1.8, 21.2.12, and 22.1.3."
|
|
},
|
|
{
|
|
"lang": "es",
|
|
"value": "Webswing versiones anteriores a 22.1.3, permite una inyecci\u00f3n del encabezado X-Forwarded-For. La direcci\u00f3n IP del cliente est\u00e1 asociada a una variable en la p\u00e1gina de configuraci\u00f3n. La variable {clientIp} puede usarse como argumento de inicio de la aplicaci\u00f3n. El encabezado X-Forwarded-For puede ser manipulado por un cliente para almacenar un valor arbitrario que es usado para reemplazar la variable clientIp (sin saneo). Un cliente puede as\u00ed inyectar m\u00faltiples argumentos en el inicio de sesi\u00f3n. Los sistemas que no usan la variable clientIp en la configuraci\u00f3n no son vulnerables. La vulnerabilidad est\u00e1 corregida en estas versiones: 20.1.16, 20.2.19, 21.1.8, 21.2.12 y 22.1.3"
|
|
}
|
|
],
|
|
"metrics": {
|
|
"cvssMetricV31": [
|
|
{
|
|
"source": "nvd@nist.gov",
|
|
"type": "Primary",
|
|
"cvssData": {
|
|
"version": "3.1",
|
|
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
|
"baseScore": 9.8,
|
|
"baseSeverity": "CRITICAL",
|
|
"attackVector": "NETWORK",
|
|
"attackComplexity": "LOW",
|
|
"privilegesRequired": "NONE",
|
|
"userInteraction": "NONE",
|
|
"scope": "UNCHANGED",
|
|
"confidentialityImpact": "HIGH",
|
|
"integrityImpact": "HIGH",
|
|
"availabilityImpact": "HIGH"
|
|
},
|
|
"exploitabilityScore": 3.9,
|
|
"impactScore": 5.9
|
|
}
|
|
],
|
|
"cvssMetricV2": [
|
|
{
|
|
"source": "nvd@nist.gov",
|
|
"type": "Primary",
|
|
"cvssData": {
|
|
"version": "2.0",
|
|
"vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
|
|
"baseScore": 6.8,
|
|
"accessVector": "NETWORK",
|
|
"accessComplexity": "MEDIUM",
|
|
"authentication": "NONE",
|
|
"confidentialityImpact": "PARTIAL",
|
|
"integrityImpact": "PARTIAL",
|
|
"availabilityImpact": "PARTIAL"
|
|
},
|
|
"baseSeverity": "MEDIUM",
|
|
"exploitabilityScore": 8.6,
|
|
"impactScore": 6.4,
|
|
"acInsufInfo": false,
|
|
"obtainAllPrivilege": false,
|
|
"obtainUserPrivilege": false,
|
|
"obtainOtherPrivilege": false,
|
|
"userInteractionRequired": false
|
|
}
|
|
]
|
|
},
|
|
"weaknesses": [
|
|
{
|
|
"source": "nvd@nist.gov",
|
|
"type": "Primary",
|
|
"description": [
|
|
{
|
|
"lang": "en",
|
|
"value": "CWE-74"
|
|
}
|
|
]
|
|
}
|
|
],
|
|
"configurations": [
|
|
{
|
|
"nodes": [
|
|
{
|
|
"operator": "OR",
|
|
"negate": false,
|
|
"cpeMatch": [
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:webswing:webswing:*:*:*:*:-:*:*:*",
|
|
"versionEndExcluding": "20.1.16",
|
|
"matchCriteriaId": "D96C9DDC-D82D-4E33-84EF-ACE64D113BB9"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:webswing:webswing:*:*:*:*:-:*:*:*",
|
|
"versionStartIncluding": "20.2",
|
|
"versionEndExcluding": "20.2.19",
|
|
"matchCriteriaId": "4C0202EF-27EC-4178-A7C3-CD83C5C58481"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:webswing:webswing:*:*:*:*:-:*:*:*",
|
|
"versionStartIncluding": "21.1.0",
|
|
"versionEndExcluding": "21.1.8",
|
|
"matchCriteriaId": "DA3907BF-50D9-46A4-889D-A24C5678CA31"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:webswing:webswing:*:*:*:*:-:*:*:*",
|
|
"versionStartIncluding": "21.2.0",
|
|
"versionEndExcluding": "21.2.12",
|
|
"matchCriteriaId": "D6CF493A-235E-40C5-AAFA-EA0F22E9DB82"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:webswing:webswing:*:*:*:*:-:*:*:*",
|
|
"versionStartIncluding": "22.1.0",
|
|
"versionEndExcluding": "22.1.3",
|
|
"matchCriteriaId": "5FDAC362-6CF2-40AA-95AC-E49A95A9C79C"
|
|
}
|
|
]
|
|
}
|
|
]
|
|
}
|
|
],
|
|
"references": [
|
|
{
|
|
"url": "https://www.webswing.org/blog/header-injection-vulnerability-cve-2022-34914",
|
|
"source": "cve@mitre.org",
|
|
"tags": [
|
|
"Vendor Advisory"
|
|
]
|
|
},
|
|
{
|
|
"url": "https://www.webswing.org/docs/20.1/faq/client_ip.html",
|
|
"source": "cve@mitre.org",
|
|
"tags": [
|
|
"Vendor Advisory"
|
|
]
|
|
},
|
|
{
|
|
"url": "https://www.webswing.org/blog/header-injection-vulnerability-cve-2022-34914",
|
|
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
|
"tags": [
|
|
"Vendor Advisory"
|
|
]
|
|
},
|
|
{
|
|
"url": "https://www.webswing.org/docs/20.1/faq/client_ip.html",
|
|
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
|
"tags": [
|
|
"Vendor Advisory"
|
|
]
|
|
}
|
|
]
|
|
} |