2024-01-25 21:00:28 +00:00

126 lines
3.8 KiB
JSON

{
"id": "CVE-2022-4597",
"sourceIdentifier": "cna@vuldb.com",
"published": "2022-12-18T11:15:10.560",
"lastModified": "2024-01-25T20:40:44.060",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
"value": "A vulnerability, which was classified as problematic, was found in Shoplazza LifeStyle 1.1. Affected is an unknown function of the file /admin/api/admin/v2_products of the component Create Product Handler. The manipulation leads to cross site scripting. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-216192."
},
{
"lang": "es",
"value": "Una vulnerabilidad fue encontrada en Shoplazza LifeStyle 1.1 y clasificada como problem\u00e1tica. Una funci\u00f3n desconocida del archivo /admin/api/admin/v2_products del componente Create Product Handler es afectada por esta vulnerabilidad. La manipulaci\u00f3n conduce a Cross-Site Scripting. Es posible lanzar el ataque de forma remota. La explotaci\u00f3n ha sido divulgada al p\u00fablico y puede utilizarse. El identificador de esta vulnerabilidad es VDB-216192."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE",
"baseScore": 5.4,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.3,
"impactScore": 2.7
},
{
"source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "LOW",
"availabilityImpact": "NONE",
"baseScore": 3.5,
"baseSeverity": "LOW"
},
"exploitabilityScore": 2.1,
"impactScore": 1.4
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-79"
}
]
},
{
"source": "cna@vuldb.com",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-707"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:shoplazza:lifestyle:1.1:*:*:*:*:shoplazza:*:*",
"matchCriteriaId": "F7D59C85-92F3-4528-A092-7E616145D879"
}
]
}
]
}
],
"references": [
{
"url": "https://seclists.org/fulldisclosure/2022/Dec/11",
"source": "cna@vuldb.com",
"tags": [
"Mailing List",
"Third Party Advisory"
]
},
{
"url": "https://seclists.org/fulldisclosure/2022/Dec/att-11/proof-of-concept-shoplazza.txt",
"source": "cna@vuldb.com",
"tags": [
"Exploit",
"Mailing List",
"Third Party Advisory"
]
},
{
"url": "https://vuldb.com/?id.216192",
"source": "cna@vuldb.com",
"tags": [
"Third Party Advisory"
]
}
]
}