CVE-2022-38130
 
Severity Score
Exploit Likelihood
Affected Versions
Public Exploits
0Exploited in Wild
-Decision
Descriptions
The com.keysight.tentacle.config.ResourceManager.smsRestoreDatabaseZip() method is used to restore the HSQLDB database used in SMS. It takes the path of the zipped database file as the single parameter. An unauthenticated, remote attacker can specify an UNC path for the database file (i.e., \\<attacker-host>\sms\<attacker-db.zip>), effectively controlling the content of the database to be restored.
El método com.keysight.tentacle.config.ResourceManager.smsRestoreDatabaseZip() es usado para restaurar la base de datos HSQLDB usada en SMS. Toma la ruta del archivo de base de datos comprimido como único parámetro. Un atacante remoto no autenticado puede especificar una ruta UNC para el archivo de la base de datos (por ejemplo, \\(attacker-host)\sms\(attacker-db.zip)), controlando efectivamente el contenido de la base de datos a restaurar
CVSS Scores
SSVC
- Decision:-
Timeline
- 2022-08-10 CVE Reserved
- 2022-08-10 CVE Published
- 2024-08-03 CVE Updated
- 2024-12-17 EPSS Updated
- ---------- Exploited in Wild
- ---------- KEV Due Date
- ---------- First Exploit
CWE
- CWE-89: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')
CAPEC
References (1)
URL | Tag | Source |
---|---|---|
https://www.tenable.com/security/research/tra-2022-28 | Third Party Advisory |
URL | Date | SRC |
---|
URL | Date | SRC |
---|
URL | Date | SRC |
---|
Affected Vendors, Products, and Versions
Vendor | Product | Version | Other | Status | ||||||
---|---|---|---|---|---|---|---|---|---|---|
Vendor | Product | Version | Other | Status | <-- --> | Vendor | Product | Version | Other | Status |
Keysight Search vendor "Keysight" | Sensor Management Server Search vendor "Keysight" for product "Sensor Management Server" | 2.4.0 Search vendor "Keysight" for product "Sensor Management Server" and version "2.4.0" | - |
Affected
|