Lucene search

K
cveHCLCVE-2022-27546
HistoryAug 29, 2022 - 4:15 p.m.

CVE-2022-27546

2022-08-2916:15:08
CWE-79
HCL
web.nvd.nist.gov
36
4
hcl inotes
reflected xss
cve-2022-27546
security vulnerability
nvd

CVSS3

8.3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

REQUIRED

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

LOW

CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:L

EPSS

0.001

Percentile

42.6%

HCL iNotes is susceptible to a Reflected Cross-site Scripting (XSS) vulnerability caused by improper validation of user-supplied input supplied with a form POST request. A remote attacker could exploit this vulnerability using a specially-crafted URL to execute script in a victim’s web browser within the security context of the hosting web site and/or steal the victim’s cookie-based authentication credentials.

Affected configurations

Nvd
Node
hcltechhcl_inotesMatch9.0.1-
OR
hcltechhcl_inotesMatch9.0.1fixpack_10
OR
hcltechhcl_inotesMatch9.0.1fixpack_3
OR
hcltechhcl_inotesMatch9.0.1fixpack_4
OR
hcltechhcl_inotesMatch9.0.1fixpack_5
OR
hcltechhcl_inotesMatch9.0.1fixpack_6
OR
hcltechhcl_inotesMatch9.0.1fixpack_7
OR
hcltechhcl_inotesMatch9.0.1fixpack_8
OR
hcltechhcl_inotesMatch9.0.1fixpack_9
OR
hcltechhcl_inotesMatch10.0
OR
hcltechhcl_inotesMatch10.0.1-
OR
hcltechhcl_inotesMatch10.0.1fixpack_1
OR
hcltechhcl_inotesMatch10.0.1fixpack_2
OR
hcltechhcl_inotesMatch10.0.1fixpack_3
OR
hcltechhcl_inotesMatch10.0.1fixpack_4
OR
hcltechhcl_inotesMatch10.0.1fixpack_5
OR
hcltechhcl_inotesMatch10.0.1fixpack_6
OR
hcltechhcl_inotesMatch10.0.1fixpack_7
OR
hcltechhcl_inotesMatch10.0.1fixpack_8
OR
hcltechhcl_inotesMatch11.0
OR
hcltechhcl_inotesMatch11.0.1-
OR
hcltechhcl_inotesMatch11.0.1fixpack_1
OR
hcltechhcl_inotesMatch11.0.1fixpack_2
OR
hcltechhcl_inotesMatch11.0.1fixpack_3
OR
hcltechhcl_inotesMatch11.0.1fixpack_4
OR
hcltechhcl_inotesMatch11.0.1fixpack_5
OR
hcltechhcl_inotesMatch12.0
OR
hcltechhcl_inotesMatch12.0.1-
OR
hcltechhcl_inotesMatch12.0.1fixpack_1
Node
hcltechdominoMatch9.0
OR
hcltechdominoMatch9.0.1-
OR
hcltechdominoMatch9.0.1fixpack_10
OR
hcltechdominoMatch9.0.1fixpack_3
OR
hcltechdominoMatch9.0.1fixpack_4
OR
hcltechdominoMatch9.0.1fixpack_5
OR
hcltechdominoMatch9.0.1fixpack_6
OR
hcltechdominoMatch9.0.1fixpack_7
OR
hcltechdominoMatch9.0.1fixpack_8
OR
hcltechdominoMatch9.0.1fixpack_9
OR
hcltechdominoMatch10.0
OR
hcltechdominoMatch10.0.1-
OR
hcltechdominoMatch10.0.1fixpack_1
OR
hcltechdominoMatch10.0.1fixpack_2
OR
hcltechdominoMatch10.0.1fixpack_3
OR
hcltechdominoMatch10.0.1fixpack_4
OR
hcltechdominoMatch10.0.1fixpack_5
OR
hcltechdominoMatch10.0.1fixpack_6
OR
hcltechdominoMatch10.0.1fixpack_7
OR
hcltechdominoMatch10.0.1fixpack_8
OR
hcltechdominoMatch11.0
OR
hcltechdominoMatch11.0.1-
OR
hcltechdominoMatch11.0.1fixpack_1
OR
hcltechdominoMatch11.0.1fixpack_2
OR
hcltechdominoMatch11.0.1fixpack_3
OR
hcltechdominoMatch11.0.1fixpack_4
OR
hcltechdominoMatch11.0.1fixpack_5
OR
hcltechdominoMatch12.0
OR
hcltechdominoMatch12.0.1-
OR
hcltechdominoMatch12.0.1fixpack_1
VendorProductVersionCPE
hcltechhcl_inotes9.0.1cpe:2.3:a:hcltech:hcl_inotes:9.0.1:-:*:*:*:*:*:*
hcltechhcl_inotes9.0.1cpe:2.3:a:hcltech:hcl_inotes:9.0.1:fixpack_10:*:*:*:*:*:*
hcltechhcl_inotes9.0.1cpe:2.3:a:hcltech:hcl_inotes:9.0.1:fixpack_3:*:*:*:*:*:*
hcltechhcl_inotes9.0.1cpe:2.3:a:hcltech:hcl_inotes:9.0.1:fixpack_4:*:*:*:*:*:*
hcltechhcl_inotes9.0.1cpe:2.3:a:hcltech:hcl_inotes:9.0.1:fixpack_5:*:*:*:*:*:*
hcltechhcl_inotes9.0.1cpe:2.3:a:hcltech:hcl_inotes:9.0.1:fixpack_6:*:*:*:*:*:*
hcltechhcl_inotes9.0.1cpe:2.3:a:hcltech:hcl_inotes:9.0.1:fixpack_7:*:*:*:*:*:*
hcltechhcl_inotes9.0.1cpe:2.3:a:hcltech:hcl_inotes:9.0.1:fixpack_8:*:*:*:*:*:*
hcltechhcl_inotes9.0.1cpe:2.3:a:hcltech:hcl_inotes:9.0.1:fixpack_9:*:*:*:*:*:*
hcltechhcl_inotes10.0cpe:2.3:a:hcltech:hcl_inotes:10.0:*:*:*:*:*:*:*
Rows per page:
1-10 of 591

CNA Affected

[
  {
    "product": "HCL iNotes",
    "vendor": "HCL Software",
    "versions": [
      {
        "status": "affected",
        "version": "9, 10, 11, 12"
      }
    ]
  }
]

Social References

More

CVSS3

8.3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

REQUIRED

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

LOW

CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:L

EPSS

0.001

Percentile

42.6%

Related for CVE-2022-27546