2024-07-14 02:06:08 +00:00

88 lines
2.3 KiB
JSON

{
"id": "CVE-2022-42753",
"sourceIdentifier": "help@fluidattacks.com",
"published": "2022-11-03T18:15:17.663",
"lastModified": "2022-11-04T19:24:55.750",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "SalonERP version 3.0.2 allows an external attacker to steal the cookie of arbitrary users. This is possible because the application does not correctly validate the page parameter against XSS attacks."
},
{
"lang": "es",
"value": "SalonERP versi\u00f3n 3.0.2 permite que un atacante externo robe las cookies de usuarios arbitrarios. Esto es posible porque la aplicaci\u00f3n no valida correctamente el par\u00e1metro de la p\u00e1gina contra ataques XSS."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE",
"baseScore": 6.1,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.8,
"impactScore": 2.7
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-79"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:salonerp_project:salonerp:3.0.2:*:*:*:*:*:*:*",
"matchCriteriaId": "F2B72C03-6D8A-465B-9F61-6CB4BCBD6874"
}
]
}
]
}
],
"references": [
{
"url": "https://fluidattacks.com/advisories/hardway/",
"source": "help@fluidattacks.com",
"tags": [
"Exploit",
"Third Party Advisory"
]
},
{
"url": "https://salonerp.sourceforge.io/",
"source": "help@fluidattacks.com",
"tags": [
"Product"
]
}
]
}