Lucene search

K
cve[email protected]CVE-2022-1526
HistoryApr 29, 2022 - 8:15 a.m.

CVE-2022-1526

2022-04-2908:15:07
CWE-79
web.nvd.nist.gov
37
cve-2022-1526
emlog pro
xss
remote attack
user signup
vulnerability disclosure
nvd

3.5 Low

CVSS2

Attack Vector

NETWORK

Attack Complexity

MEDIUM

Authentication

SINGLE

Confidentiality Impact

NONE

Integrity Impact

PARTIAL

Availability Impact

NONE

AV:N/AC:M/Au:S/C:N/I:P/A:N

5.4 Medium

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

REQUIRED

Scope

CHANGED

Confidentiality Impact

LOW

Integrity Impact

LOW

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N

0.001 Low

EPSS

Percentile

22.9%

A vulnerability, which was classified as problematic, was found in Emlog Pro up to 1.2.2. This affects the POST parameter handling of articles. The manipulation with the input <script>alert(1);</script> leads to cross site scripting. It is possible to initiate the attack remotely but it requires a signup and login by the attacker. The exploit has been disclosed to the public and may be used.

Affected configurations

Vulners
NVD
Node
emlog_pro_projectemlog_proMatch1.2.0
OR
emlog_pro_projectemlog_proMatch1.2.1
OR
emlog_pro_projectemlog_proMatch1.2.2
VendorProductVersionCPE
emlog_pro_projectemlog_pro1.2.0cpe:2.3:a:emlog_pro_project:emlog_pro:1.2.0:*:*:*:*:*:*:*
emlog_pro_projectemlog_pro1.2.1cpe:2.3:a:emlog_pro_project:emlog_pro:1.2.1:*:*:*:*:*:*:*
emlog_pro_projectemlog_pro1.2.2cpe:2.3:a:emlog_pro_project:emlog_pro:1.2.2:*:*:*:*:*:*:*

CNA Affected

[
  {
    "product": "Emlog Pro",
    "vendor": "unspecified",
    "versions": [
      {
        "status": "affected",
        "version": "1.2.0"
      },
      {
        "status": "affected",
        "version": "1.2.1"
      },
      {
        "status": "affected",
        "version": "1.2.2"
      }
    ]
  }
]

3.5 Low

CVSS2

Attack Vector

NETWORK

Attack Complexity

MEDIUM

Authentication

SINGLE

Confidentiality Impact

NONE

Integrity Impact

PARTIAL

Availability Impact

NONE

AV:N/AC:M/Au:S/C:N/I:P/A:N

5.4 Medium

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

REQUIRED

Scope

CHANGED

Confidentiality Impact

LOW

Integrity Impact

LOW

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N

0.001 Low

EPSS

Percentile

22.9%

Related for CVE-2022-1526