Lucene search

K
cve[email protected]CVE-2022-48581
HistoryAug 09, 2023 - 6:15 p.m.

CVE-2022-48581

2023-08-0918:15:10
CWE-78
web.nvd.nist.gov
9
cve-2022-48581
command injection
sciencelogic sl1
dash export
vulnerability
nvd

8.8 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

8.9 High

AI Score

Confidence

High

0.001 Low

EPSS

Percentile

19.9%

A command injection vulnerability exists in the “dash export” feature of the ScienceLogic SL1 that takes unsanitized user controlled input and passes it directly to a shell command. This allows for the injection of arbitrary commands to the underlying operating system.

Affected configurations

NVD
Node
sciencelogicsl1Range11.1.2

CNA Affected

[
  {
    "defaultStatus": "affected",
    "product": "SL 1",
    "vendor": "ScienceLogic",
    "versions": [
      {
        "status": "affected",
        "version": "11.1.2"
      }
    ]
  }
]

8.8 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

8.9 High

AI Score

Confidence

High

0.001 Low

EPSS

Percentile

19.9%

Related for CVE-2022-48581