// For flags

CVE-2022-39181

GLPI - Reports plugin for GLPI Reflected Cross-Site-Scripting (RXSS)

Severity Score

6.1
*CVSS v3.1

Exploit Likelihood

*EPSS

Affected Versions

*CPE

Public Exploits

0
*Multiple Sources

Exploited in Wild

-
*KEV

Decision

-
*SSVC
Descriptions

GLPI - Reports plugin for GLPI Reflected Cross-Site-Scripting (RXSS).
Type 1: Reflected XSS (or Non-Persistent) - The server reads data directly from the HTTP request and reflects it back in
the HTTP response. Reflected XSS exploits occur when an attacker causes a victim to supply dangerous content to a
vulnerable web application, which is then reflected back to the victim and executed by the web browser. The most
common mechanism for delivering malicious content is to include it as a parameter in a URL that is posted publicly or emailed directly to the victim. URLs constructed in this manner constitute the core of many phishing schemes, whereby
an attacker convinces a victim to visit a URL that refers to a vulnerable site. After the site reflects the attacker's content
back to the victim, the content is executed by the victim's browser.

GLPI: complemento de informes para GLPI Cross-Site-Scripting (XSS) Reflejado. Tipo 1: XSS reflejado (o no persistente): el servidor lee los datos directamente de la solicitud HTTP y los refleja en la respuesta HTTP. Los exploits XSS reflejados ocurren cuando un atacante hace que una víctima proporcione contenido peligroso a una aplicación web vulnerable, que luego se refleja en la víctima y el navegador web lo ejecuta. El mecanismo más común para entregar contenido malicioso es incluirlo como parámetro en una URL que se publica públicamente o se envía por correo electrónico directamente a la víctima. Las URL construidas de esta manera constituyen el núcleo de muchos esquemas de phishing, mediante los cuales un atacante convence a una víctima para que visite una URL que hace referencia a un sitio vulnerable. Después de que el sitio refleja el contenido del atacante a la víctima, el navegador de la víctima ejecuta el contenido.

*Credits: Moriel Harush, Dudu Moyal - EY – Hacktics.
CVSS Scores
Attack Vector
Network
Attack Complexity
Low
Privileges Required
None
User Interaction
Required
Scope
Changed
Confidentiality
Low
Integrity
Low
Availability
None
* Common Vulnerability Scoring System
SSVC
  • Decision:-
Exploitation
-
Automatable
-
Tech. Impact
-
* Organization's Worst-case Scenario
Timeline
  • 2022-09-02 CVE Reserved
  • 2022-11-17 CVE Published
  • 2024-06-09 EPSS Updated
  • 2024-08-03 CVE Updated
  • ---------- Exploited in Wild
  • ---------- KEV Due Date
  • ---------- First Exploit
CWE
  • CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
CAPEC
Affected Vendors, Products, and Versions
Vendor Product Version Other Status
Vendor Product Version Other Status <-- --> Vendor Product Version Other Status
Glpi-project
Search vendor "Glpi-project"
Reports
Search vendor "Glpi-project" for product "Reports"
-glpi
Affected