mirror of
https://github.com/fkie-cad/nvd-json-data-feeds.git
synced 2025-05-28 17:21:36 +00:00
155 lines
4.9 KiB
JSON
155 lines
4.9 KiB
JSON
{
|
|
"id": "CVE-2022-38790",
|
|
"sourceIdentifier": "cve@mitre.org",
|
|
"published": "2022-09-01T13:15:09.070",
|
|
"lastModified": "2024-11-21T07:17:05.723",
|
|
"vulnStatus": "Modified",
|
|
"cveTags": [],
|
|
"descriptions": [
|
|
{
|
|
"lang": "en",
|
|
"value": "Weave GitOps Enterprise before 0.9.0-rc.5 has a cross-site scripting (XSS) bug allowing a malicious user to inject a javascript: link in the UI. When clicked by a victim user, the script will execute with the victim's permission. The exposure appears in Weave GitOps Enterprise UI via a GitopsCluster dashboard link. An annotation can be added to a GitopsCluster custom resource."
|
|
},
|
|
{
|
|
"lang": "es",
|
|
"value": "Weave GitOps Enterprise versiones anteriores a 0.9.0-rc.5, presenta un fallo de tipo cross-site scripting (XSS) que permite a un usuario malicioso inyectar un enlace javascript: en la Interfaz de Usuario. Cuando un usuario v\u00edctima haga clic en \u00e9l, el script ser\u00e1 ejecutado con el permiso de la v\u00edctima. La exposici\u00f3n aparece en la Interfaz de Usuario de Weave GitOps Enterprise por medio de un enlace en el panel de control de GitopsCluster. Puede a\u00f1adirse una anotaci\u00f3n a un recurso personalizado de GitopsCluster"
|
|
}
|
|
],
|
|
"metrics": {
|
|
"cvssMetricV31": [
|
|
{
|
|
"source": "nvd@nist.gov",
|
|
"type": "Primary",
|
|
"cvssData": {
|
|
"version": "3.1",
|
|
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
|
|
"baseScore": 5.4,
|
|
"baseSeverity": "MEDIUM",
|
|
"attackVector": "NETWORK",
|
|
"attackComplexity": "LOW",
|
|
"privilegesRequired": "LOW",
|
|
"userInteraction": "REQUIRED",
|
|
"scope": "CHANGED",
|
|
"confidentialityImpact": "LOW",
|
|
"integrityImpact": "LOW",
|
|
"availabilityImpact": "NONE"
|
|
},
|
|
"exploitabilityScore": 2.3,
|
|
"impactScore": 2.7
|
|
}
|
|
]
|
|
},
|
|
"weaknesses": [
|
|
{
|
|
"source": "nvd@nist.gov",
|
|
"type": "Primary",
|
|
"description": [
|
|
{
|
|
"lang": "en",
|
|
"value": "CWE-79"
|
|
}
|
|
]
|
|
}
|
|
],
|
|
"configurations": [
|
|
{
|
|
"nodes": [
|
|
{
|
|
"operator": "OR",
|
|
"negate": false,
|
|
"cpeMatch": [
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:weave.works:gitops:*:*:*:*:enterprise:*:*:*",
|
|
"versionEndExcluding": "0.9.0",
|
|
"matchCriteriaId": "D1F02905-44E5-4CA4-960D-382E59E109A4"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:weave.works:gitops:0.9.0:rc1:*:*:enterprise:*:*:*",
|
|
"matchCriteriaId": "F66ECC59-69EA-4668-9D9A-F7001FE34034"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:weave.works:gitops:0.9.0:rc2:*:*:enterprise:*:*:*",
|
|
"matchCriteriaId": "3302337E-A9D4-4071-8A58-A5A945FCA0C3"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:weave.works:gitops:0.9.0:rc3:*:*:enterprise:*:*:*",
|
|
"matchCriteriaId": "E0477D3D-4DA3-4A8A-B096-BD186FA8B6EB"
|
|
}
|
|
]
|
|
}
|
|
]
|
|
}
|
|
],
|
|
"references": [
|
|
{
|
|
"url": "https://docs.gitops.weave.works/docs/cluster-management/getting-started/#profiles-and-clusters",
|
|
"source": "cve@mitre.org",
|
|
"tags": [
|
|
"Product",
|
|
"Vendor Advisory"
|
|
]
|
|
},
|
|
{
|
|
"url": "https://docs.gitops.weave.works/docs/intro",
|
|
"source": "cve@mitre.org",
|
|
"tags": [
|
|
"Product",
|
|
"Vendor Advisory"
|
|
]
|
|
},
|
|
{
|
|
"url": "https://docs.gitops.weave.works/security/cve/enterprise/CVE-2022-38790/index.html",
|
|
"source": "cve@mitre.org",
|
|
"tags": [
|
|
"Exploit",
|
|
"Patch",
|
|
"Vendor Advisory"
|
|
]
|
|
},
|
|
{
|
|
"url": "https://www.weave.works/product/gitops-enterprise/",
|
|
"source": "cve@mitre.org",
|
|
"tags": [
|
|
"Product",
|
|
"Vendor Advisory"
|
|
]
|
|
},
|
|
{
|
|
"url": "https://docs.gitops.weave.works/docs/cluster-management/getting-started/#profiles-and-clusters",
|
|
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
|
"tags": [
|
|
"Product",
|
|
"Vendor Advisory"
|
|
]
|
|
},
|
|
{
|
|
"url": "https://docs.gitops.weave.works/docs/intro",
|
|
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
|
"tags": [
|
|
"Product",
|
|
"Vendor Advisory"
|
|
]
|
|
},
|
|
{
|
|
"url": "https://docs.gitops.weave.works/security/cve/enterprise/CVE-2022-38790/index.html",
|
|
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
|
"tags": [
|
|
"Exploit",
|
|
"Patch",
|
|
"Vendor Advisory"
|
|
]
|
|
},
|
|
{
|
|
"url": "https://www.weave.works/product/gitops-enterprise/",
|
|
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
|
"tags": [
|
|
"Product",
|
|
"Vendor Advisory"
|
|
]
|
|
}
|
|
]
|
|
} |