CVE-2022-34322
 
Severity Score
Exploit Likelihood
Affected Versions
Public Exploits
1Exploited in Wild
-Decision
Descriptions
Multiple XSS issues were discovered in Sage Enterprise Intelligence 2021 R1.1 that allow an attacker to execute JavaScript code in the context of users' browsers. The attacker needs to be authenticated to reach the vulnerable features. An issue is present in the Notify Users About Modification menu and the Notifications feature. A user can send malicious notifications and execute JavaScript code in the browser of every user who has enabled notifications. This is a stored XSS, and can lead to privilege escalation in the context of the application. (Another issue is present in the Favorites tab. The name of a favorite or a folder of favorites is interpreted as HTML, and can thus embed JavaScript code, which is executed when displayed. This is a self-XSS.)
Se descubrieron múltiples problemas XSS en Sage Enterprise Intelligence 2021 R1.1 que permiten a un atacante ejecutar código JavaScript en el contexto de los navegadores de los usuarios. El atacante debe autenticarse para acceder a las funciones vulnerables. Hay un problema en el menú Notificar a los usuarios sobre la modificación y en la función Notificaciones. Un usuario puede enviar notificaciones maliciosas y ejecutar código JavaScript en el navegador de cada usuario que haya habilitado las notificaciones. Este es un XSS almacenado y puede provocar una escalada de privilegios en el contexto de la aplicación. (Otro problema está presente en la pestaña Favoritos. El nombre de un favorito o una carpeta de favoritos se interpreta como HTML y, por lo tanto, puede incrustar código JavaScript, que se ejecuta cuando se muestra. Este es un XSS propio).
CVSS Scores
SSVC
- Decision:-
Timeline
- 2022-06-22 CVE Reserved
- 2023-01-01 CVE Published
- 2024-08-03 CVE Updated
- 2024-08-03 First Exploit
- 2024-12-17 EPSS Updated
- ---------- Exploited in Wild
- ---------- KEV Due Date
CWE
- CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
CAPEC
References (1)
URL | Tag | Source |
---|
URL | Date | SRC |
---|---|---|
https://www.synacktiv.com/sites/default/files/2022-12/sage_sei_multiple_xss.pdf | 2024-08-03 |
URL | Date | SRC |
---|
URL | Date | SRC |
---|
Affected Vendors, Products, and Versions
Vendor | Product | Version | Other | Status | ||||||
---|---|---|---|---|---|---|---|---|---|---|
Vendor | Product | Version | Other | Status | <-- --> | Vendor | Product | Version | Other | Status |
Sage Search vendor "Sage" | Sage Enterprise Intelligence Search vendor "Sage" for product "Sage Enterprise Intelligence" | 2021_r1.1 Search vendor "Sage" for product "Sage Enterprise Intelligence" and version "2021_r1.1" | - |
Affected
|