Lucene search

K
nvd[email protected]NVD:CVE-2022-37108
HistorySep 07, 2022 - 2:15 p.m.

CVE-2022-37108

2022-09-0714:15:09
CWE-74
web.nvd.nist.gov
3
securonix
snypr
injection vulnerability
syslog-ng
configuration wizard
arbitrary code
remote ingesters
text files
crontab files
patch
jun 2022 r3_[06170871]

CVSS3

7.2

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

HIGH

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H

EPSS

0.001

Percentile

47.3%

An injection vulnerability in the syslog-ng configuration wizard in Securonix Snypr 6.4 allows an application user with the “Manage Ingesters” permission to execute arbitrary code on remote ingesters by appending arbitrary text to text files that are executed by the system, such as users’ crontab files. The patch for this was present in SNYPR version 6.4 Jun 2022 R3_[06170871], but may have been introduced sooner.

Affected configurations

Nvd
Node
securonixsnyprMatch6.4
VendorProductVersionCPE
securonixsnypr6.4cpe:2.3:a:securonix:snypr:6.4:*:*:*:*:*:*:*

CVSS3

7.2

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

HIGH

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H

EPSS

0.001

Percentile

47.3%

Related for NVD:CVE-2022-37108