2024-12-08 03:06:42 +00:00

171 lines
6.1 KiB
JSON

{
"id": "CVE-2022-26348",
"sourceIdentifier": "disclosures@gallagher.com",
"published": "2022-07-06T17:15:07.937",
"lastModified": "2024-11-21T06:53:48.040",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Command Centre Server is vulnerable to SQL Injection via Windows Registry settings for date fields on the server. The Windows Registry setting allows an attacker using the Visitor Management Kiosk, an application designed for public use, to invoke an arbitrary SQL query that has been preloaded into the registry of the Windows Server to obtain sensitive information. This issue affects: Gallagher Command Centre 8.60 versions prior to 8.60.1652; 8.50 versions prior to 8.50.2245; 8.40 versions prior to 8.40.2216; 8.30 versions prior to 8.30.1470; version 8.20 and prior versions."
},
{
"lang": "es",
"value": "Command Centre Server es vulnerable a una inyecci\u00f3n SQL por medio de la configuraci\u00f3n del Registro de Windows para los campos de fecha en el servidor. La configuraci\u00f3n del Registro de Windows permite a un atacante usando el Kiosco de Administraci\u00f3n de Visitantes, una aplicaci\u00f3n dise\u00f1ada para uso p\u00fablico, invocar una consulta SQL arbitraria que ha sido precargada en el registro del Servidor de Windows para obtener informaci\u00f3n confidencial. Este problema afecta a: Gallagher Command Centre versiones 8.60 anteriores a 8.60.1652; versiones 8.50 anteriores a 8.50.2245; versiones 8.40 anteriores a 8.40.2216; versiones 8.30 anteriores a 8.30.1470; versiones 8.20 y anteriores"
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "disclosures@gallagher.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H",
"baseScore": 8.2,
"baseSeverity": "HIGH",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "HIGH",
"userInteraction": "NONE",
"scope": "CHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 1.5,
"impactScore": 6.0
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 1.8,
"impactScore": 3.6
}
],
"cvssMetricV2": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "2.0",
"vectorString": "AV:L/AC:L/Au:N/C:P/I:N/A:N",
"baseScore": 2.1,
"accessVector": "LOCAL",
"accessComplexity": "LOW",
"authentication": "NONE",
"confidentialityImpact": "PARTIAL",
"integrityImpact": "NONE",
"availabilityImpact": "NONE"
},
"baseSeverity": "LOW",
"exploitabilityScore": 3.9,
"impactScore": 2.9,
"acInsufInfo": false,
"obtainAllPrivilege": false,
"obtainUserPrivilege": false,
"obtainOtherPrivilege": false,
"userInteractionRequired": false
}
]
},
"weaknesses": [
{
"source": "disclosures@gallagher.com",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-89"
}
]
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-89"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:gallagher:command_centre:*:*:*:*:*:*:*:*",
"versionEndIncluding": "8.20",
"matchCriteriaId": "08FDEAA9-8012-4149-9D76-77E41CB4DD10"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:gallagher:command_centre:*:*:*:*:*:*:*:*",
"versionStartIncluding": "8.30",
"versionEndExcluding": "8.30.1470",
"matchCriteriaId": "B661AF12-667B-4470-984E-AC109FE1B4A2"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:gallagher:command_centre:*:*:*:*:*:*:*:*",
"versionStartIncluding": "8.40",
"versionEndExcluding": "8.40.2216",
"matchCriteriaId": "4D083D37-176B-4A15-83D9-0486A2355D83"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:gallagher:command_centre:*:*:*:*:*:*:*:*",
"versionStartIncluding": "8.50",
"versionEndExcluding": "8.50.2245",
"matchCriteriaId": "2F3A5031-A6FF-4A4F-8B2F-14389BA76F0E"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:gallagher:command_centre:*:*:*:*:*:*:*:*",
"versionStartIncluding": "8.60",
"versionEndExcluding": "8.60.1652",
"matchCriteriaId": "58EF5C9C-9377-44A2-9EA8-664650955786"
}
]
}
]
}
],
"references": [
{
"url": "https://security.gallagher.com/Security-Advisories/CVE-2022-26348",
"source": "disclosures@gallagher.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "https://security.gallagher.com/Security-Advisories/CVE-2022-26348",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
]
}
]
}