Lucene search

K
cvelistGitHub_MCVELIST:CVE-2022-31037
HistoryOct 18, 2022 - 12:00 a.m.

CVE-2022-31037 OroCommerce vulnerable to Cross-site Scripting via Shipping rule editing page

2022-10-1800:00:00
CWE-79
GitHub_M
www.cve.org
3
orocommerce
shipping rule
cross-site scripting
vulnerability
version 5.0.6
ups surcharge

CVSS3

6.9

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

HIGH

User Interaction

REQUIRED

Scope

CHANGED

Confidentiality Impact

HIGH

Integrity Impact

LOW

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:H/I:L/A:N

EPSS

0.001

Percentile

22.7%

OroCommerce is an open-source Business to Business Commerce application. Versions between 4.1.0 and 4.1.17 inclusive, 4.2.0 and 4.2.11 inclusive, and between 5.0.0 and 5.0.3 inclusive, are vulnerable to Cross-site Scripting in the UPS Surcharge field of the Shipping rule edit page. The attacker needs permission to create or edit a shipping rule. This issue has been patched in version 5.0.6. There are no known workarounds.

CNA Affected

[
  {
    "vendor": "oroinc",
    "product": "orocommerce",
    "versions": [
      {
        "version": ">= 4.1.0, <= 4.1.17",
        "status": "affected"
      },
      {
        "version": ">= 4.2.0, <= 4.2.11 ",
        "status": "affected"
      },
      {
        "version": ">= 5.0.0, <= 5.0.3",
        "status": "affected"
      }
    ]
  }
]

CVSS3

6.9

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

HIGH

User Interaction

REQUIRED

Scope

CHANGED

Confidentiality Impact

HIGH

Integrity Impact

LOW

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:H/I:L/A:N

EPSS

0.001

Percentile

22.7%

Related for CVELIST:CVE-2022-31037