CVE-2023-32226 – Sysaid - CWE-552: Files or Directories Accessible to External Parties
https://notcve.org/view.php?id=CVE-2023-32226
Sysaid - CWE-552: Files or Directories Accessible to External Parties - Authenticated users may exfiltrate files from the server via an unspecified method. • https://www.gov.il/en/Departments/faq/cve_advisories • CWE-552: Files or Directories Accessible to External Parties •
CVE-2023-32225 – Sysaid - CWE-434: Unrestricted Upload of File with Dangerous Type
https://notcve.org/view.php?id=CVE-2023-32225
Sysaid - CWE-434: Unrestricted Upload of File with Dangerous Type - A malicious user with administrative privileges may be able to upload a dangerous filetype via an unspecified method. • https://www.gov.il/en/Departments/faq/cve_advisories • CWE-434: Unrestricted Upload of File with Dangerous Type •
CVE-2022-23166 – Sysaid – Sysaid Local File Inclusion (LFI)
https://notcve.org/view.php?id=CVE-2022-23166
Sysaid – Sysaid Local File Inclusion (LFI) – An unauthenticated attacker can access to the system by accessing to "/lib/tinymce/examples/index.html" path. in the "Insert/Edit Embedded Media" window Choose Type : iFrame and File/URL : [here is the LFI] Solution: Update to 22.2.20 cloud version, or to 22.1.64 on premise version. Sysaid - Sysaid Inclusión de Archivos Locales (LFI) - Un atacante no autenticado puede acceder al sistema, al acceder a una ruta "/lib/tinymce/examples/index.html". en la ventana "Insert/Edit Embedded Media" Elija el Tipo : iFrame y el Archivo/URL : [aquí está el LFI] Solución: Actualizar a versión 22.2.20 en la nube, o versión 22.1.64 en las instalaciones • https://www.gov.il/en/departments/faq/cve_advisories • CWE-22: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') •
CVE-2022-23165 – Sysaid – Sysaid 14.2.0 Reflected Cross-Site Scripting (XSS)
https://notcve.org/view.php?id=CVE-2022-23165
Sysaid – Sysaid 14.2.0 Reflected Cross-Site Scripting (XSS) - The parameter "helpPageName" used by the page "/help/treecontent.jsp" suffers from a Reflected Cross-Site Scripting vulnerability. For an attacker to exploit this Cross-Site Scripting vulnerability, it's necessary for the affected product to expose the Offline Help Pages. An attacker may gain access to sensitive information or execute client-side code in the browser session of the victim user. Furthermore, an attacker would require the victim to open a malicious link. An attacker may exploit this vulnerability in order to perform phishing attacks. • https://www.gov.il/en/departments/faq/cve_advisories • CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') •
CVE-2022-22798 – Sysaid – Pro Plus Edition, SysAid Help Desk Broken Access Control
https://notcve.org/view.php?id=CVE-2022-22798
Sysaid – Pro Plus Edition, SysAid Help Desk Broken Access Control v20.4.74 b10, v22.1.20 b62, v22.1.30 b49 - An attacker needs to log in as a guest after that the system redirects him to the service portal or EndUserPortal.JSP, then he needs to change the path in the URL to /ConcurrentLogin%2ejsp after that he will receive an error message with a login button, by clicking on it, he will connect to the system dashboard. The attacker can receive sensitive data like server details, usernames, workstations, etc. He can also perform actions such as uploading files, deleting calls from the system. Sysaid - Pro Plus Edition, SysAid Help Desk Broken Access Control versiones v20.4.74 b10, v22.1.20 b62, v22.1.30 b49 - Un atacante necesita iniciar sesión como invitado, después de lo cual el sistema lo redirige al portal de servicios o EndUserPortal.JSP, luego necesita cambiar la ruta en la URL a /ConcurrentLogin%2ejsp, después de lo cual recibirá un mensaje de error con un botón de inicio de sesión, al hacer clic en él, será conectado al tablero del sistema. El atacante puede recibir datos confidenciales como detalles del servidor, nombres de usuario, estaciones de trabajo, etc. • https://www.gov.il/en/departments/faq/cve_advisories •