Lucene search

K
cve[email protected]CVE-2022-37310
HistoryDec 26, 2022 - 4:15 a.m.

CVE-2022-37310

2022-12-2604:15:10
CWE-79
web.nvd.nist.gov
26
cve-2022-37310
ox app suite
xss
metrics
help
uri

6.1 Medium

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

REQUIRED

Scope

CHANGED

Confidentiality Impact

LOW

Integrity Impact

LOW

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N

0.001 Low

EPSS

Percentile

35.4%

OX App Suite through 7.10.6 allows XSS via a malicious capability to the metrics or help module, as demonstrated by a /#!!&app=io.ox/files&cap= URI.

Affected configurations

NVD
Node
open-xchangeopen-xchange_appsuiteRange<7.10.5
OR
open-xchangeopen-xchange_appsuiteMatch7.10.5-
OR
open-xchangeopen-xchange_appsuiteMatch7.10.5patch_release_5961
OR
open-xchangeopen-xchange_appsuiteMatch7.10.5patch_release_5973
OR
open-xchangeopen-xchange_appsuiteMatch7.10.5patch_release_5976
OR
open-xchangeopen-xchange_appsuiteMatch7.10.5patch_release_5982
OR
open-xchangeopen-xchange_appsuiteMatch7.10.5patch_release_5989
OR
open-xchangeopen-xchange_appsuiteMatch7.10.5patch_release_5994
OR
open-xchangeopen-xchange_appsuiteMatch7.10.5patch_release_6000
OR
open-xchangeopen-xchange_appsuiteMatch7.10.5patch_release_6003
OR
open-xchangeopen-xchange_appsuiteMatch7.10.5patch_release_6008
OR
open-xchangeopen-xchange_appsuiteMatch7.10.5patch_release_6010
OR
open-xchangeopen-xchange_appsuiteMatch7.10.5patch_release_6016
OR
open-xchangeopen-xchange_appsuiteMatch7.10.5patch_release_6020
OR
open-xchangeopen-xchange_appsuiteMatch7.10.5patch_release_6026
OR
open-xchangeopen-xchange_appsuiteMatch7.10.5patch_release_6029
OR
open-xchangeopen-xchange_appsuiteMatch7.10.5patch_release_6034
OR
open-xchangeopen-xchange_appsuiteMatch7.10.5patch_release_6035
OR
open-xchangeopen-xchange_appsuiteMatch7.10.5patch_release_6038
OR
open-xchangeopen-xchange_appsuiteMatch7.10.5patch_release_6046
OR
open-xchangeopen-xchange_appsuiteMatch7.10.5patch_release_6051
OR
open-xchangeopen-xchange_appsuiteMatch7.10.5patch_release_6053
OR
open-xchangeopen-xchange_appsuiteMatch7.10.5patch_release_6060
OR
open-xchangeopen-xchange_appsuiteMatch7.10.5patch_release_6061
OR
open-xchangeopen-xchange_appsuiteMatch7.10.5patch_release_6066
OR
open-xchangeopen-xchange_appsuiteMatch7.10.5patch_release_6068
OR
open-xchangeopen-xchange_appsuiteMatch7.10.5patch_release_6072
OR
open-xchangeopen-xchange_appsuiteMatch7.10.5patch_release_6079
OR
open-xchangeopen-xchange_appsuiteMatch7.10.5patch_release_6084
OR
open-xchangeopen-xchange_appsuiteMatch7.10.5patch_release_6092
OR
open-xchangeopen-xchange_appsuiteMatch7.10.5patch_release_6101
OR
open-xchangeopen-xchange_appsuiteMatch7.10.5patch_release_6111
OR
open-xchangeopen-xchange_appsuiteMatch7.10.5patch_release_6120
OR
open-xchangeopen-xchange_appsuiteMatch7.10.5patch_release_6132
OR
open-xchangeopen-xchange_appsuiteMatch7.10.5patch_release_6137
OR
open-xchangeopen-xchange_appsuiteMatch7.10.5patch_release_6140
OR
open-xchangeopen-xchange_appsuiteMatch7.10.5patch_release_6149
OR
open-xchangeopen-xchange_appsuiteMatch7.10.6-
OR
open-xchangeopen-xchange_appsuiteMatch7.10.6patch_release_6069
OR
open-xchangeopen-xchange_appsuiteMatch7.10.6patch_release_6073
OR
open-xchangeopen-xchange_appsuiteMatch7.10.6patch_release_6080
OR
open-xchangeopen-xchange_appsuiteMatch7.10.6patch_release_6085
OR
open-xchangeopen-xchange_appsuiteMatch7.10.6patch_release_6093
OR
open-xchangeopen-xchange_appsuiteMatch7.10.6patch_release_6102
OR
open-xchangeopen-xchange_appsuiteMatch7.10.6patch_release_6112
OR
open-xchangeopen-xchange_appsuiteMatch7.10.6patch_release_6121
OR
open-xchangeopen-xchange_appsuiteMatch7.10.6patch_release_6133
OR
open-xchangeopen-xchange_appsuiteMatch7.10.6patch_release_6138
OR
open-xchangeopen-xchange_appsuiteMatch7.10.6patch_release_6141
OR
open-xchangeopen-xchange_appsuiteMatch7.10.6patch_release_6146
OR
open-xchangeopen-xchange_appsuiteMatch7.10.6patch_release_6147
OR
open-xchangeopen-xchange_appsuiteMatch7.10.6patch_release_6148
OR
open-xchangeopen-xchange_appsuiteMatch7.10.6patch_release_6150

6.1 Medium

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

REQUIRED

Scope

CHANGED

Confidentiality Impact

LOW

Integrity Impact

LOW

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N

0.001 Low

EPSS

Percentile

35.4%

Related for CVE-2022-37310