Lucene search

K
cvelistGitHub_MCVELIST:CVE-2022-39301
HistoryOct 19, 2022 - 12:00 a.m.

CVE-2022-39301 sra-admin is vulnerable to storage cross-site scripting (XSS) via unrestricted file upload

2022-10-1900:00:00
CWE-434
CWE-80
GitHub_M
www.cve.org
1
sra-admin
storage cross-site scripting
xss
unrestricted file upload
patch
version 1.1.1
version 1.1.2
personal information theft

8.2 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

REQUIRED

Scope

CHANGED

Confidentiality Impact

HIGH

Integrity Impact

LOW

Availability Impact

LOW

CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:H/I:L/A:L

7.8 High

AI Score

Confidence

High

0.001 Low

EPSS

Percentile

24.9%

sra-admin is a background rights management system that separates the front and back end. sra-admin version 1.1.1 has a storage cross-site scripting (XSS) vulnerability. After logging into the sra-admin background, an attacker can upload an html page containing xss attack code in “Personal Center” - “Profile Picture Upload” allowing theft of the user’s personal information. This issue has been patched in 1.1.2. There are no known workarounds.

CNA Affected

[
  {
    "vendor": "momofoolish",
    "product": "sra-admin",
    "versions": [
      {
        "version": "< 1.1.2",
        "status": "affected"
      }
    ]
  }
]

8.2 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

REQUIRED

Scope

CHANGED

Confidentiality Impact

HIGH

Integrity Impact

LOW

Availability Impact

LOW

CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:H/I:L/A:L

7.8 High

AI Score

Confidence

High

0.001 Low

EPSS

Percentile

24.9%

Related for CVELIST:CVE-2022-39301