2024-12-08 03:06:42 +00:00

89 lines
2.8 KiB
JSON

{
"id": "CVE-2022-44787",
"sourceIdentifier": "cve@mitre.org",
"published": "2022-11-21T23:15:13.557",
"lastModified": "2024-11-21T07:28:27.093",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "An issue was discovered in Appalti & Contratti 9.12.2. The web applications are vulnerable to a Reflected Cross-Site Scripting issue. The idPagina parameter is reflected inside the server response without any HTML encoding, resulting in XSS when the victim moves the mouse pointer inside the page. As an example, the onmouseenter attribute is not sanitized."
},
{
"lang": "es",
"value": "Se descubri\u00f3 un problema en Appalti & Contratti 9.12.2. Las aplicaciones web son vulnerables a un problema de Cross-Site Scripting reflejado. El par\u00e1metro idPagina se refleja dentro de la respuesta del servidor sin ninguna codificaci\u00f3n HTML, lo que da como resultado XSS cuando la v\u00edctima mueve el puntero del mouse dentro de la p\u00e1gina. Por ejemplo, el atributo onmouseenter no est\u00e1 sanitizado."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
"baseScore": 6.1,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 2.8,
"impactScore": 2.7
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-79"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:maggioli:appalti_\\&_contratti:9.12.2:*:*:*:*:*:*:*",
"matchCriteriaId": "CDE25FE7-3242-4542-A150-D24ED7156CD2"
}
]
}
]
}
],
"references": [
{
"url": "https://members.backbox.org/maggioli-appalti-contratti-multiple-vulnerabilities/",
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Third Party Advisory"
]
},
{
"url": "https://members.backbox.org/maggioli-appalti-contratti-multiple-vulnerabilities/",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Third Party Advisory"
]
}
]
}