Lucene search

K
cve[email protected]CVE-2022-2272
HistoryAug 03, 2022 - 4:15 p.m.

CVE-2022-2272

2022-08-0316:15:08
CWE-89
web.nvd.nist.gov
33
7
cve-2022-2272
sante pacs server
remote attackers
authentication bypass
sql injection
vulnerability

9.8 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

0.009 Low

EPSS

Percentile

82.8%

This vulnerability allows remote attackers to bypass authentication on affected installations of Sante PACS Server 3.0.4. Authentication is not required to exploit this vulnerability. The specific flaw exists within the processing of calls to the login endpoint. When parsing the username element, the process does not properly validate a user-supplied string before using it to construct SQL queries. An attacker can leverage this vulnerability to bypass authentication on the system. Was ZDI-CAN-17331.

Affected configurations

Vulners
NVD
Node
santepacs_serverRange3.0.4

CNA Affected

[
  {
    "product": "PACS Server",
    "vendor": "Sante",
    "versions": [
      {
        "status": "affected",
        "version": "3.0.4"
      }
    ]
  }
]

Social References

More

9.8 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

0.009 Low

EPSS

Percentile

82.8%

Related for CVE-2022-2272