2024-12-08 03:06:42 +00:00

112 lines
3.3 KiB
JSON

{
"id": "CVE-2022-35223",
"sourceIdentifier": "twcert@cert.org.tw",
"published": "2022-08-02T16:15:10.930",
"lastModified": "2024-11-21T07:10:55.460",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "EasyUse MailHunter Ultimate\u2019s cookie deserialization function has an inadequate validation vulnerability. Deserializing a cookie containing malicious payload will trigger this insecure deserialization vulnerability, allowing an unauthenticated remote attacker to execute arbitrary code, manipulate system command or interrupt service."
},
{
"lang": "es",
"value": "La funci\u00f3n deserialization de cookies de EasyUse MailHunter Ultimate presenta una vulnerabilidad de comprobaci\u00f3n inapropiada. La deserializaci\u00f3n de una cookie que contenga una carga maliciosa desencadenar\u00e1 esta vulnerabilidad de deserializaci\u00f3n no segura, permitiendo a un atacante remoto no autenticado ejecutar c\u00f3digo arbitrario, manipular el comando del sistema o interrumpir el servicio"
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "twcert@cert.org.tw",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "twcert@cert.org.tw",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-502"
}
]
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-502"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:easyuse:mailhunter_ultimate:*:*:*:*:*:*:*:*",
"versionEndIncluding": "2020",
"matchCriteriaId": "EE3B8A9B-9B3C-484C-AD70-AAB5C2CA82C5"
}
]
}
]
}
],
"references": [
{
"url": "https://www.chtsecurity.com/news/a381467e-74ff-4a8c-a4d3-fc86720f5400",
"source": "twcert@cert.org.tw",
"tags": [
"Third Party Advisory"
]
},
{
"url": "https://www.twcert.org.tw/tw/cp-132-6365-b056c-1.html",
"source": "twcert@cert.org.tw",
"tags": [
"Third Party Advisory"
]
},
{
"url": "https://www.chtsecurity.com/news/a381467e-74ff-4a8c-a4d3-fc86720f5400",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
]
},
{
"url": "https://www.twcert.org.tw/tw/cp-132-6365-b056c-1.html",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
]
}
]
}