2024-12-15 03:03:56 +00:00

146 lines
4.9 KiB
JSON

{
"id": "CVE-2022-42466",
"sourceIdentifier": "security@apache.org",
"published": "2022-10-19T08:15:11.340",
"lastModified": "2024-11-21T07:25:01.167",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Prior to 2.0.0-M9, it was possible for an end-user to set the value of an editable string property of a domain object to a value that would be rendered unchanged when the value was saved. In particular, the end-user could enter javascript or similar and this would be executed. As of this release, the inputted strings are properly escaped when rendered."
},
{
"lang": "es",
"value": "En versiones anteriores a 2.0.0-M9, era posible que un usuario final estableciera el valor de una propiedad de cadena editable de un objeto de dominio con un valor que no era modificaba cuando era guardado el valor. En particular, el usuario final pod\u00eda introducir javascript o algo similar y \u00e9ste era ejecutado. A partir de esta versi\u00f3n, las cadenas introducidas eran escapadas apropiadamente cuando eran renderizadas"
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
"baseScore": 6.1,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 2.8,
"impactScore": 2.7
}
]
},
"weaknesses": [
{
"source": "security@apache.org",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-79"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:apache:isis:*:*:*:*:*:*:*:*",
"versionEndExcluding": "2.0.0",
"matchCriteriaId": "E940F705-65AB-4319-99DB-67D73F62E2F2"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:apache:isis:2.0.0:milestone1:*:*:*:*:*:*",
"matchCriteriaId": "E5D32A2B-ECBA-40E5-AF1D-194C536645EF"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:apache:isis:2.0.0:milestone2:*:*:*:*:*:*",
"matchCriteriaId": "B8389E1B-8771-4548-8B83-B39E15D01C4C"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:apache:isis:2.0.0:milestone3:*:*:*:*:*:*",
"matchCriteriaId": "A2318214-EF00-4539-8D05-4F711EAD9DD5"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:apache:isis:2.0.0:milestone4:*:*:*:*:*:*",
"matchCriteriaId": "02F94190-2ADB-449A-A4E9-BE59942062CE"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:apache:isis:2.0.0:milestone5:*:*:*:*:*:*",
"matchCriteriaId": "B3CC7391-4AA4-411C-BC8A-AF9076669F11"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:apache:isis:2.0.0:milestone6:*:*:*:*:*:*",
"matchCriteriaId": "49C66C27-8D1F-468A-A1AD-B6537E6F5587"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:apache:isis:2.0.0:milestone7:*:*:*:*:*:*",
"matchCriteriaId": "5F9C0F4C-618B-4CF0-BC5E-0A527FCE968E"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:apache:isis:2.0.0:milestone8:*:*:*:*:*:*",
"matchCriteriaId": "EC37A5B6-0C22-45EC-9873-233ACD46BDC9"
}
]
}
]
}
],
"references": [
{
"url": "http://www.openwall.com/lists/oss-security/2022/10/19/2",
"source": "security@apache.org",
"tags": [
"Mailing List",
"Third Party Advisory"
]
},
{
"url": "https://lists.apache.org/thread/83ftj5jgtv3mbm28w3trjyvd591jztrz",
"source": "security@apache.org",
"tags": [
"Mailing List",
"Vendor Advisory"
]
},
{
"url": "http://www.openwall.com/lists/oss-security/2022/10/19/2",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Mailing List",
"Third Party Advisory"
]
},
{
"url": "https://lists.apache.org/thread/83ftj5jgtv3mbm28w3trjyvd591jztrz",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Mailing List",
"Vendor Advisory"
]
}
]
}