Lucene search

K
cve[email protected]CVE-2022-4966
HistoryApr 01, 2024 - 12:15 p.m.

CVE-2022-4966

2024-04-0112:15:07
CWE-79
web.nvd.nist.gov
36
vulnerability
sequentech
admin-console
remote
cross-site scripting
upgrade
version 7.0.0-beta.1
patch
identifier
nvd

3.5 Low

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

REQUIRED

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

LOW

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:N

3.9 Low

AI Score

Confidence

High

4 Medium

CVSS2

Access Vector

Access Complexity

Authentication

SINGLE

Confidentiality Impact

NONE

Integrity Impact

PARTIAL

Availability Impact

NONE

AV:N/AC:L/Au:S/C:N/I:P/A:N

0.0004 Low

EPSS

Percentile

10.3%

A vulnerability was found in sequentech admin-console up to 6.1.7 and classified as problematic. Affected by this issue is some unknown functionality of the component Election Description Handler. The manipulation leads to cross site scripting. The attack may be launched remotely. Upgrading to version 7.0.0-beta.1 is able to address this issue. The patch is identified as 0043a6b1e6e0f5abc9557e73f9ffc524fc5d609d. It is recommended to upgrade the affected component. VDB-258782 is the identifier assigned to this vulnerability.

Affected configurations

Vulners
Node
sequentechadmin-consoleMatch6.1.0
OR
sequentechadmin-consoleMatch6.1.1
OR
sequentechadmin-consoleMatch6.1.2
OR
sequentechadmin-consoleMatch6.1.3
OR
sequentechadmin-consoleMatch6.1.4
OR
sequentechadmin-consoleMatch6.1.5
OR
sequentechadmin-consoleMatch6.1.6
OR
sequentechadmin-consoleMatch6.1.7

CNA Affected

[
  {
    "vendor": "sequentech",
    "product": "admin-console",
    "versions": [
      {
        "version": "6.1.0",
        "status": "affected"
      },
      {
        "version": "6.1.1",
        "status": "affected"
      },
      {
        "version": "6.1.2",
        "status": "affected"
      },
      {
        "version": "6.1.3",
        "status": "affected"
      },
      {
        "version": "6.1.4",
        "status": "affected"
      },
      {
        "version": "6.1.5",
        "status": "affected"
      },
      {
        "version": "6.1.6",
        "status": "affected"
      },
      {
        "version": "6.1.7",
        "status": "affected"
      }
    ],
    "modules": [
      "Election Description Handler"
    ]
  }
]

3.5 Low

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

REQUIRED

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

LOW

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:N

3.9 Low

AI Score

Confidence

High

4 Medium

CVSS2

Access Vector

Access Complexity

Authentication

SINGLE

Confidentiality Impact

NONE

Integrity Impact

PARTIAL

Availability Impact

NONE

AV:N/AC:L/Au:S/C:N/I:P/A:N

0.0004 Low

EPSS

Percentile

10.3%

Related for CVE-2022-4966