// For flags

CVE-2022-4725

AWS SDK XML Parser XpathUtils.java XpathUtils server-side request forgery

Severity Score

9.8
*CVSS v3.1

Exploit Likelihood

*EPSS

Affected Versions

*CPE

Public Exploits

0
*Multiple Sources

Exploited in Wild

-
*KEV

Decision

-
*SSVC
Descriptions

A vulnerability was found in AWS SDK 2.59.0. It has been rated as critical. This issue affects the function XpathUtils of the file aws-android-sdk-core/src/main/java/com/amazonaws/util/XpathUtils.java of the component XML Parser. The manipulation leads to server-side request forgery. Upgrading to version 2.59.1 is able to address this issue. The name of the patch is c3e6d69422e1f0c80fe53f2d757b8df97619af2b. It is recommended to upgrade the affected component. The identifier VDB-216737 was assigned to this vulnerability.

Se encontró una vulnerabilidad en AWS SDK 2.59.0. Ha sido calificada como crítica. Este problema afecta la función XpathUtils del archivo aws-android-sdk-core/src/main/java/com/amazonaws/util/XpathUtils.java del componente XML Parser. La manipulación conduce a server-side request forgery. La actualización a la versión 2.59.1 puede solucionar este problema. El nombre del parche es c3e6d69422e1f0c80fe53f2d757b8df97619af2b. Se recomienda actualizar el componente afectado. A esta vulnerabilidad se le asignó el identificador VDB-216737.

Eine Schwachstelle wurde in AWS SDK 2.59.0 ausgemacht. Sie wurde als kritisch eingestuft. Dies betrifft die Funktion XpathUtils der Datei aws-android-sdk-core/src/main/java/com/amazonaws/util/XpathUtils.java der Komponente XML Parser. Durch Manipulation mit unbekannten Daten kann eine server-side request forgery-Schwachstelle ausgenutzt werden. Ein Aktualisieren auf die Version 2.59.1 vermag dieses Problem zu lösen. Der Patch wird als c3e6d69422e1f0c80fe53f2d757b8df97619af2b bezeichnet. Als bestmögliche Massnahme wird das Einspielen eines Upgrades empfohlen.

*Credits: N/A
CVSS Scores
Attack Vector
Network
Attack Complexity
Low
Privileges Required
None
User Interaction
None
Scope
Unchanged
Confidentiality
High
Integrity
High
Availability
High
Attack Vector
Adjacent
Attack Complexity
Low
Privileges Required
Low
User Interaction
None
Scope
Unchanged
Confidentiality
Low
Integrity
Low
Availability
Low
* Common Vulnerability Scoring System
SSVC
  • Decision:-
Exploitation
-
Automatable
-
Tech. Impact
-
* Organization's Worst-case Scenario
Timeline
  • 2022-12-24 CVE Reserved
  • 2022-12-24 CVE Published
  • 2024-08-03 CVE Updated
  • 2024-08-14 EPSS Updated
  • ---------- Exploited in Wild
  • ---------- KEV Due Date
  • ---------- First Exploit
CWE
  • CWE-918: Server-Side Request Forgery (SSRF)
CAPEC
Affected Vendors, Products, and Versions
Vendor Product Version Other Status
Vendor Product Version Other Status <-- --> Vendor Product Version Other Status
Amazon
Search vendor "Amazon"
Aws Software Development Kit
Search vendor "Amazon" for product "Aws Software Development Kit"
< 2.59.1
Search vendor "Amazon" for product "Aws Software Development Kit" and version " < 2.59.1"
android
Affected