Lucene search

K
cvelistRedhatCVELIST:CVE-2022-3962
HistorySep 23, 2023 - 7:00 p.m.

CVE-2022-3962 Kiali: error message spoofing in kiali ui

2023-09-2319:00:54
CWE-74
redhat
www.cve.org
4
kiali
content spoofing
ui
error handling
text injection
vulnerability
cve-2022-3962

CVSS3

4.3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

REQUIRED

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

LOW

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N

AI Score

5

Confidence

High

EPSS

0.001

Percentile

25.6%

A content spoofing vulnerability was found in Kiali. It was discovered that Kiali does not implement error handling when the page or endpoint being accessed cannot be found. This issue allows an attacker to perform arbitrary text injection when an error response is retrieved from the URL being accessed.

CNA Affected

[
  {
    "vendor": "Red Hat",
    "product": "Red Hat OpenShift Service Mesh 2.3 for RHEL 8",
    "collectionURL": "https://catalog.redhat.com/software/containers/",
    "packageName": "openshift-service-mesh/kiali-rhel8",
    "defaultStatus": "affected",
    "versions": [
      {
        "version": "1.57.5-3",
        "lessThan": "*",
        "versionType": "rpm",
        "status": "unaffected"
      }
    ],
    "cpes": [
      "cpe:/a:redhat:service_mesh:2.3::el8"
    ]
  },
  {
    "vendor": "Red Hat",
    "product": "OpenShift Service Mesh 2.1",
    "collectionURL": "https://access.redhat.com/downloads/content/package-browser/",
    "packageName": "openshift-service-mesh/kiali-rhel8",
    "defaultStatus": "affected",
    "cpes": [
      "cpe:/a:redhat:service_mesh:2.1"
    ]
  }
]

CVSS3

4.3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

REQUIRED

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

LOW

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N

AI Score

5

Confidence

High

EPSS

0.001

Percentile

25.6%