René Helmke 7791f18b51 bootstrap
2023-05-16 16:09:41 +02:00

83 lines
2.1 KiB
JSON

{
"id": "CVE-2022-42747",
"sourceIdentifier": "help@fluidattacks.com",
"published": "2022-11-03T20:15:32.617",
"lastModified": "2023-01-26T20:20:08.060",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
"value": "CandidATS version 3.0.0 on 'sortBy' of the 'ajax.php' resource, allows an external attacker to steal the cookie of arbitrary users. This is possible because the application application does not properly validate user input against XSS attacks."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE",
"baseScore": 6.1,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.8,
"impactScore": 2.7
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-79"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:auieo:candidats:3.0.0:-:*:*:*:*:*:*",
"matchCriteriaId": "49FA43A5-7FB5-4E3A-8530-06C2BC31B078"
}
]
}
]
}
],
"references": [
{
"url": "https://candidats.net/",
"source": "help@fluidattacks.com",
"tags": [
"Product"
]
},
{
"url": "https://fluidattacks.com/advisories/modestep/",
"source": "help@fluidattacks.com",
"tags": [
"Exploit",
"Third Party Advisory"
]
}
]
}