2024-12-08 03:06:42 +00:00

89 lines
4.1 KiB
JSON

{
"id": "CVE-2022-44784",
"sourceIdentifier": "cve@mitre.org",
"published": "2022-11-21T23:15:12.813",
"lastModified": "2024-11-21T07:28:26.683",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "An issue was discovered in Appalti & Contratti 9.12.2. The target web applications LFS and DL229 expose a set of services provided by the Axis 1.4 instance, embedded directly into the applications, as hinted by the WEB-INF/web.xml file leaked through Local File Inclusion. Among the exposed services, there is the Axis AdminService, which, through the default configuration, should normally be accessible only by the localhost. Nevertheless, by trying to access the mentioned service, both in LFS and DL229, the service can actually be reached even by remote users, allowing creation of arbitrary services on the server side. When an attacker can reach the AdminService, they can use it to instantiate arbitrary services on the server. The exploit procedure is well known and described in Generic AXIS-SSRF exploitation. Basically, the attack consists of writing a JSP page inside the root directory of the web application, through the org.apache.axis.handlers.LogHandler class."
},
{
"lang": "es",
"value": "Se descubri\u00f3 un problema en Appalti & Contratti 9.12.2. Las aplicaciones web de destino LFS y DL229 exponen un conjunto de servicios proporcionados por la instancia de Axis 1.4, integrados directamente en las aplicaciones, como lo sugiere el archivo WEB-INF/web.xml filtrado a trav\u00e9s de Local File Inclusion. Entre los servicios expuestos, se encuentra Axis AdminService, al que, a trav\u00e9s de la configuraci\u00f3n predeterminada, normalmente solo deber\u00eda poder acceder el host local. Sin embargo, al intentar acceder al servicio mencionado, tanto en LFS como en DL229, el servicio puede ser alcanzado incluso por usuarios remotos, permitiendo la creaci\u00f3n de servicios arbitrarios en el lado del servidor. Cuando un atacante puede acceder al AdminService, puede usarlo para crear instancias de servicios arbitrarios en el servidor. El procedimiento de explotaci\u00f3n es bien conocido y se describe en Explotaci\u00f3n gen\u00e9rica de AXIS-SSRF. B\u00e1sicamente, el ataque consiste en escribir una p\u00e1gina JSP dentro del directorio ra\u00edz de la aplicaci\u00f3n web, a trav\u00e9s de la clase org.apache.axis.handlers.LogHandler."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 2.8,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "NVD-CWE-Other"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:maggioli:appalti_\\&_contratti:9.12.2:*:*:*:*:*:*:*",
"matchCriteriaId": "CDE25FE7-3242-4542-A150-D24ED7156CD2"
}
]
}
]
}
],
"references": [
{
"url": "https://members.backbox.org/maggioli-appalti-contratti-multiple-vulnerabilities/",
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Third Party Advisory"
]
},
{
"url": "https://members.backbox.org/maggioli-appalti-contratti-multiple-vulnerabilities/",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Third Party Advisory"
]
}
]
}