Lucene search

K
cve[email protected]CVE-2022-4521
HistoryDec 15, 2022 - 9:15 p.m.

CVE-2022-4521

2022-12-1521:15:12
CWE-79
web.nvd.nist.gov
77
cve-2022-4521
wso2 carbon-registry
cross site scripting
remote attack
security vulnerability

6.1 Medium

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

REQUIRED

Scope

CHANGED

Confidentiality Impact

LOW

Integrity Impact

LOW

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N

0.001 Low

EPSS

Percentile

38.2%

A vulnerability classified as problematic has been found in WSO2 carbon-registry up to 4.8.6. This affects an unknown part of the component Request Parameter Handler. The manipulation of the argument parentPath/path/username/path/profile_menu leads to cross site scripting. It is possible to initiate the attack remotely. Upgrading to version 4.8.7 is able to address this issue. The name of the patch is 9f967abfde9317bee2cda469dbc09b57d539f2cc. It is recommended to upgrade the affected component. The identifier VDB-215901 was assigned to this vulnerability.

Affected configurations

Vulners
NVD
Node
wso2carbon-registryMatch4.8.0
OR
wso2carbon-registryMatch4.8.1
OR
wso2carbon-registryMatch4.8.2
OR
wso2carbon-registryMatch4.8.3
OR
wso2carbon-registryMatch4.8.4
OR
wso2carbon-registryMatch4.8.5
OR
wso2carbon-registryMatch4.8.6
VendorProductVersionCPE
wso2carbon\-registry4.8.0cpe:2.3:a:wso2:carbon\-registry:4.8.0:*:*:*:*:*:*:*
wso2carbon\-registry4.8.1cpe:2.3:a:wso2:carbon\-registry:4.8.1:*:*:*:*:*:*:*
wso2carbon\-registry4.8.2cpe:2.3:a:wso2:carbon\-registry:4.8.2:*:*:*:*:*:*:*
wso2carbon\-registry4.8.3cpe:2.3:a:wso2:carbon\-registry:4.8.3:*:*:*:*:*:*:*
wso2carbon\-registry4.8.4cpe:2.3:a:wso2:carbon\-registry:4.8.4:*:*:*:*:*:*:*
wso2carbon\-registry4.8.5cpe:2.3:a:wso2:carbon\-registry:4.8.5:*:*:*:*:*:*:*
wso2carbon\-registry4.8.6cpe:2.3:a:wso2:carbon\-registry:4.8.6:*:*:*:*:*:*:*

CNA Affected

[
  {
    "vendor": "WSO2",
    "product": "carbon-registry",
    "versions": [
      {
        "version": "4.8.0",
        "status": "affected"
      },
      {
        "version": "4.8.1",
        "status": "affected"
      },
      {
        "version": "4.8.2",
        "status": "affected"
      },
      {
        "version": "4.8.3",
        "status": "affected"
      },
      {
        "version": "4.8.4",
        "status": "affected"
      },
      {
        "version": "4.8.5",
        "status": "affected"
      },
      {
        "version": "4.8.6",
        "status": "affected"
      }
    ],
    "modules": [
      "Request Parameter Handler"
    ]
  }
]

6.1 Medium

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

REQUIRED

Scope

CHANGED

Confidentiality Impact

LOW

Integrity Impact

LOW

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N

0.001 Low

EPSS

Percentile

38.2%