// For flags

CVE-2022-34322

 

Severity Score

9.0
*CVSS v3.1

Exploit Likelihood

*EPSS

Affected Versions

*CPE

Public Exploits

1
*Multiple Sources

Exploited in Wild

-
*KEV

Decision

-
*SSVC
Descriptions

Multiple XSS issues were discovered in Sage Enterprise Intelligence 2021 R1.1 that allow an attacker to execute JavaScript code in the context of users' browsers. The attacker needs to be authenticated to reach the vulnerable features. An issue is present in the Notify Users About Modification menu and the Notifications feature. A user can send malicious notifications and execute JavaScript code in the browser of every user who has enabled notifications. This is a stored XSS, and can lead to privilege escalation in the context of the application. (Another issue is present in the Favorites tab. The name of a favorite or a folder of favorites is interpreted as HTML, and can thus embed JavaScript code, which is executed when displayed. This is a self-XSS.)

Se descubrieron múltiples problemas XSS en Sage Enterprise Intelligence 2021 R1.1 que permiten a un atacante ejecutar código JavaScript en el contexto de los navegadores de los usuarios. El atacante debe autenticarse para acceder a las funciones vulnerables. Hay un problema en el menú Notificar a los usuarios sobre la modificación y en la función Notificaciones. Un usuario puede enviar notificaciones maliciosas y ejecutar código JavaScript en el navegador de cada usuario que haya habilitado las notificaciones. Este es un XSS almacenado y puede provocar una escalada de privilegios en el contexto de la aplicación. (Otro problema está presente en la pestaña Favoritos. El nombre de un favorito o una carpeta de favoritos se interpreta como HTML y, por lo tanto, puede incrustar código JavaScript, que se ejecuta cuando se muestra. Este es un XSS propio).

*Credits: N/A
CVSS Scores
Attack Vector
Network
Attack Complexity
Low
Privileges Required
Low
User Interaction
Required
Scope
Changed
Confidentiality
High
Integrity
High
Availability
High
* Common Vulnerability Scoring System
SSVC
  • Decision:-
Exploitation
-
Automatable
-
Tech. Impact
-
* Organization's Worst-case Scenario
Timeline
  • 2022-06-22 CVE Reserved
  • 2023-01-01 CVE Published
  • 2024-07-24 EPSS Updated
  • 2024-08-03 CVE Updated
  • 2024-08-03 First Exploit
  • ---------- Exploited in Wild
  • ---------- KEV Due Date
CWE
  • CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
CAPEC
Affected Vendors, Products, and Versions
Vendor Product Version Other Status
Vendor Product Version Other Status <-- --> Vendor Product Version Other Status
Sage
Search vendor "Sage"
Sage Enterprise Intelligence
Search vendor "Sage" for product "Sage Enterprise Intelligence"
2021_r1.1
Search vendor "Sage" for product "Sage Enterprise Intelligence" and version "2021_r1.1"
-
Affected