Lucene search

K
nvd[email protected]NVD:CVE-2022-48581
HistoryAug 09, 2023 - 6:15 p.m.

CVE-2022-48581

2023-08-0918:15:10
CWE-78
web.nvd.nist.gov
1
sciencelogic sl1
command injection
dash export
vulnerability
unsanitized input
shell command
arbitrary commands
operating system

CVSS3

8.8

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

AI Score

9

Confidence

High

EPSS

0.001

Percentile

31.7%

A command injection vulnerability exists in the “dash export” feature of the ScienceLogic SL1 that takes unsanitized user controlled input and passes it directly to a shell command. This allows for the injection of arbitrary commands to the underlying operating system.

Affected configurations

Nvd
Node
sciencelogicsl1Range11.1.2
VendorProductVersionCPE
sciencelogicsl1*cpe:2.3:a:sciencelogic:sl1:*:*:*:*:*:*:*:*

CVSS3

8.8

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

AI Score

9

Confidence

High

EPSS

0.001

Percentile

31.7%

Related for NVD:CVE-2022-48581