Vulnerabilites related to SysAid - SysAid
Vulnerability from fkie_nvd
Published
2022-05-12 20:15
Modified
2024-11-21 06:48
Severity ?
6.1 (Medium) - CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:L/A:L
9.8 (Critical) - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
9.8 (Critical) - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Summary
Sysaid – Sysaid Local File Inclusion (LFI) – An unauthenticated attacker can access to the system by accessing to "/lib/tinymce/examples/index.html" path. in the "Insert/Edit Embedded Media" window Choose Type : iFrame and File/URL : [here is the LFI] Solution: Update to 22.2.20 cloud version, or to 22.1.64 on premise version.
References
▼ | URL | Tags | |
---|---|---|---|
cna@cyber.gov.il | https://www.gov.il/en/departments/faq/cve_advisories | Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://www.gov.il/en/departments/faq/cve_advisories | Third Party Advisory |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:sysaid:sysaid:*:*:*:*:on-premises:*:*:*", "matchCriteriaId": "2705AD15-BD6F-4F05-8826-894DA3428679", "versionEndExcluding": "22.1.64", "vulnerable": true }, { "criteria": "cpe:2.3:a:sysaid:sysaid:*:*:*:*:cloud:*:*:*", "matchCriteriaId": "1421E8E9-535B-483B-93AB-49D244550327", "versionEndExcluding": "22.2.20", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Sysaid \u2013 Sysaid Local File Inclusion (LFI) \u2013 An unauthenticated attacker can access to the system by accessing to \"/lib/tinymce/examples/index.html\" path. in the \"Insert/Edit Embedded Media\" window Choose Type : iFrame and File/URL : [here is the LFI] Solution: Update to 22.2.20 cloud version, or to 22.1.64 on premise version." }, { "lang": "es", "value": "Sysaid - Sysaid Inclusi\u00f3n de Archivos Locales (LFI) - Un atacante no autenticado puede acceder al sistema, al acceder a una ruta \"/lib/tinymce/examples/index.html\". en la ventana \"Insert/Edit Embedded Media\" Elija el Tipo : iFrame y el Archivo/URL : [aqu\u00ed est\u00e1 el LFI] Soluci\u00f3n: Actualizar a versi\u00f3n 22.2.20 en la nube, o versi\u00f3n 22.1.64 en las instalaciones" } ], "id": "CVE-2022-23166", "lastModified": "2024-11-21T06:48:06.947", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 10.0, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 10.0, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "LOW", "baseScore": 6.1, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "LOW", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:L/A:L", "version": "3.1" }, "exploitabilityScore": 1.3, "impactScore": 4.7, "source": "cna@cyber.gov.il", "type": "Secondary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2022-05-12T20:15:15.320", "references": [ { "source": "cna@cyber.gov.il", "tags": [ "Third Party Advisory" ], "url": "https://www.gov.il/en/departments/faq/cve_advisories" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://www.gov.il/en/departments/faq/cve_advisories" } ], "sourceIdentifier": "cna@cyber.gov.il", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-22" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2015-06-08 14:59
Modified
2024-11-21 02:28
Severity ?
Summary
The RdsLogsEntry servlet in SysAid Help Desk before 15.2 does not properly check file extensions, which allows remote attackers to upload and execute arbitrary files via a NULL byte after the extension, as demonstrated by a .war%00 file.
References
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:sysaid:sysaid:*:*:*:*:*:*:*:*", "matchCriteriaId": "7733C5DB-1070-4A0E-99E9-14299634B65B", "versionEndIncluding": "15.1", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "The RdsLogsEntry servlet in SysAid Help Desk before 15.2 does not properly check file extensions, which allows remote attackers to upload and execute arbitrary files via a NULL byte after the extension, as demonstrated by a .war%00 file." }, { "lang": "es", "value": "El servlet RdsLogsEntry en SysAid Help Desk en versiones anteriores a 15.2 no verifica adecuadamente las extensiones de archivo, lo que permite a atacantes remotos cargar y ejecutar archivos a trav\u00e9s de un byte NULL despu\u00e9s de la extensi\u00f3n, seg\u00fan lo demostrado por un archivo .war%00." } ], "id": "CVE-2015-2995", "lastModified": "2024-11-21T02:28:28.073", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2015-06-08T14:59:03.603", "references": [ { "source": "cve@mitre.org", "tags": [ "Exploit" ], "url": "http://packetstormsecurity.com/files/132138/SysAid-Help-Desk-14.4-Code-Execution-Denial-Of-Service-Traversal-SQL-Injection.html" }, { "source": "cve@mitre.org", "tags": [ "Exploit" ], "url": "http://seclists.org/fulldisclosure/2015/Jun/8" }, { "source": "cve@mitre.org", "tags": [ "Exploit" ], "url": "http://www.rapid7.com/db/modules/exploit/multi/http/sysaid_rdslogs_file_upload" }, { "source": "cve@mitre.org", "url": "http://www.securityfocus.com/archive/1/535679/100/0/threaded" }, { "source": "cve@mitre.org", "url": "http://www.securityfocus.com/bid/75038" }, { "source": "cve@mitre.org", "url": "https://www.exploit-db.com/exploits/37667/" }, { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "https://www.sysaid.com/blog/entry/sysaid-15-2-your-voice-your-service-desk" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit" ], "url": "http://packetstormsecurity.com/files/132138/SysAid-Help-Desk-14.4-Code-Execution-Denial-Of-Service-Traversal-SQL-Injection.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit" ], "url": "http://seclists.org/fulldisclosure/2015/Jun/8" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit" ], "url": "http://www.rapid7.com/db/modules/exploit/multi/http/sysaid_rdslogs_file_upload" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/archive/1/535679/100/0/threaded" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/bid/75038" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://www.exploit-db.com/exploits/37667/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://www.sysaid.com/blog/entry/sysaid-15-2-your-voice-your-service-desk" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-22" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2024-06-06 09:15
Modified
2024-11-21 09:22
Severity ?
9.1 (Critical) - CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H
9.8 (Critical) - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
9.8 (Critical) - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Summary
SysAid - CWE-78: Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
References
▼ | URL | Tags | |
---|---|---|---|
cna@cyber.gov.il | https://www.gov.il/en/Departments/faq/cve_advisories | Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://www.gov.il/en/Departments/faq/cve_advisories | Third Party Advisory |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:sysaid:sysaid:*:*:*:*:on-premises:*:*:*", "matchCriteriaId": "860CE587-F45B-47BC-A88D-00B4B8C51C1F", "versionEndIncluding": "23.3.38", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "SysAid - CWE-78: Improper Neutralization of Special Elements used in an OS Command (\u0027OS Command Injection\u0027)" }, { "lang": "es", "value": "SysAid - CWE-78: Neutralizaci\u00f3n inadecuada de elementos especiales utilizados en un comando del sistema operativo (\"Inyecci\u00f3n de comando del sistema operativo\")" } ], "id": "CVE-2024-36394", "lastModified": "2024-11-21T09:22:05.317", "metrics": { "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.1, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "HIGH", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 2.3, "impactScore": 6.0, "source": "cna@cyber.gov.il", "type": "Secondary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2024-06-06T09:15:14.660", "references": [ { "source": "cna@cyber.gov.il", "tags": [ "Third Party Advisory" ], "url": "https://www.gov.il/en/Departments/faq/cve_advisories" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://www.gov.il/en/Departments/faq/cve_advisories" } ], "sourceIdentifier": "cna@cyber.gov.il", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-78" } ], "source": "cna@cyber.gov.il", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2023-11-24 02:15
Modified
2024-11-21 08:05
Severity ?
Summary
SysAid before 23.2.15 allows Indirect Object Reference (IDOR) attacks to read ticket data via a modified sid parameter to EmailHtmlSourceIframe.jsp or a modified srID parameter to ShowMessage.jsp.
References
▼ | URL | Tags | |
---|---|---|---|
cve@mitre.org | https://blog.pridesec.com.br/en/insecure-direct-object-reference-idor-affects-helpdesk-sysaid/ | Exploit, Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://blog.pridesec.com.br/en/insecure-direct-object-reference-idor-affects-helpdesk-sysaid/ | Exploit, Third Party Advisory |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:sysaid:sysaid:*:*:*:*:on-premises:*:*:*", "matchCriteriaId": "97785D07-2E5D-4F37-B1FC-898B87B91A76", "versionEndExcluding": "23.2.15", "vulnerable": true }, { "criteria": "cpe:2.3:a:sysaid:sysaid:*:*:*:*:cloud:*:*:*", "matchCriteriaId": "F65F2B7D-04B1-4DBC-9283-FC10C428D79E", "versionEndExcluding": "23.2.50", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "SysAid before 23.2.15 allows Indirect Object Reference (IDOR) attacks to read ticket data via a modified sid parameter to EmailHtmlSourceIframe.jsp or a modified srID parameter to ShowMessage.jsp." }, { "lang": "es", "value": "SysAid anterior a 23.2.15 permite que los ataques de Indirect Object Reference (IDOR) lean datos de tickets a trav\u00e9s de un par\u00e1metro sid modificado en EmailHtmlSourceIframe.jsp o un par\u00e1metro srID modificado en ShowMessage.jsp." } ], "id": "CVE-2023-33706", "lastModified": "2024-11-21T08:05:53.283", "metrics": { "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2023-11-24T02:15:42.323", "references": [ { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://blog.pridesec.com.br/en/insecure-direct-object-reference-idor-affects-helpdesk-sysaid/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://blog.pridesec.com.br/en/insecure-direct-object-reference-idor-affects-helpdesk-sysaid/" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-639" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2015-06-08 14:59
Modified
2024-11-21 02:28
Severity ?
Summary
SysAid Help Desk before 15.2 uses a hardcoded password of Password1 for the sa SQL Server Express user account, which allows remote authenticated users to bypass intended access restrictions by leveraging knowledge of this password.
References
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:sysaid:sysaid:*:*:*:*:*:*:*:*", "matchCriteriaId": "7733C5DB-1070-4A0E-99E9-14299634B65B", "versionEndIncluding": "15.1", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "SysAid Help Desk before 15.2 uses a hardcoded password of Password1 for the sa SQL Server Express user account, which allows remote authenticated users to bypass intended access restrictions by leveraging knowledge of this password." }, { "lang": "es", "value": "SysAid Help Desk anterior a 15.2 utiliza una contrase\u00f1a embebida de Password1 para la cuenta de usuario sa SQL Server Express, lo que permite a usuarios remotos autenticados evadir las restricciones de acceso mediante el aprovechamiento de esta contrase\u00f1a." } ], "id": "CVE-2015-3001", "lastModified": "2024-11-21T02:28:28.980", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2015-06-08T14:59:09.397", "references": [ { "source": "cve@mitre.org", "tags": [ "Exploit" ], "url": "http://packetstormsecurity.com/files/132138/SysAid-Help-Desk-14.4-Code-Execution-Denial-Of-Service-Traversal-SQL-Injection.html" }, { "source": "cve@mitre.org", "tags": [ "Exploit" ], "url": "http://seclists.org/fulldisclosure/2015/Jun/8" }, { "source": "cve@mitre.org", "url": "http://www.securityfocus.com/archive/1/535679/100/0/threaded" }, { "source": "cve@mitre.org", "url": "http://www.securityfocus.com/bid/75035" }, { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "https://www.sysaid.com/blog/entry/sysaid-15-2-your-voice-your-service-desk" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit" ], "url": "http://packetstormsecurity.com/files/132138/SysAid-Help-Desk-14.4-Code-Execution-Denial-Of-Service-Traversal-SQL-Injection.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit" ], "url": "http://seclists.org/fulldisclosure/2015/Jun/8" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/archive/1/535679/100/0/threaded" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/bid/75035" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://www.sysaid.com/blog/entry/sysaid-15-2-your-voice-your-service-desk" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-255" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2015-06-08 14:59
Modified
2024-11-21 02:28
Severity ?
Summary
Multiple directory traversal vulnerabilities in SysAid Help Desk before 15.2 allow remote attackers to (1) read arbitrary files via a .. (dot dot) in the fileName parameter to getGfiUpgradeFile or (2) cause a denial of service (CPU and memory consumption) via a .. (dot dot) in the fileName parameter to calculateRdsFileChecksum.
References
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:sysaid:sysaid:*:*:*:*:*:*:*:*", "matchCriteriaId": "7733C5DB-1070-4A0E-99E9-14299634B65B", "versionEndIncluding": "15.1", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Multiple directory traversal vulnerabilities in SysAid Help Desk before 15.2 allow remote attackers to (1) read arbitrary files via a .. (dot dot) in the fileName parameter to getGfiUpgradeFile or (2) cause a denial of service (CPU and memory consumption) via a .. (dot dot) in the fileName parameter to calculateRdsFileChecksum." }, { "lang": "es", "value": "M\u00faltiples vulnerabilidades de salto de directorio en SysAid Help Desk anterior a 15.2 permiten a atacantes remotos (1) leer ficheros arbitrarios a trav\u00e9s de un .. (punto punto) en el par\u00e1metro fileName en getGfiUpgradeFile o (2) causar una denegaci\u00f3n de servicio (consumo de CPU y memoria) a trav\u00e9s de un .. (punto punto) en el par\u00e1metro fileName en calculateRdsFileChecksum." } ], "id": "CVE-2015-2996", "lastModified": "2024-11-21T02:28:28.237", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 8.5, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:C", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 7.8, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2015-06-08T14:59:04.633", "references": [ { "source": "cve@mitre.org", "tags": [ "Exploit" ], "url": "http://packetstormsecurity.com/files/132138/SysAid-Help-Desk-14.4-Code-Execution-Denial-Of-Service-Traversal-SQL-Injection.html" }, { "source": "cve@mitre.org", "tags": [ "Exploit" ], "url": "http://seclists.org/fulldisclosure/2015/Jun/8" }, { "source": "cve@mitre.org", "url": "http://www.securityfocus.com/archive/1/535679/100/0/threaded" }, { "source": "cve@mitre.org", "url": "http://www.securityfocus.com/bid/75038" }, { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "https://www.sysaid.com/blog/entry/sysaid-15-2-your-voice-your-service-desk" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit" ], "url": "http://packetstormsecurity.com/files/132138/SysAid-Help-Desk-14.4-Code-Execution-Denial-Of-Service-Traversal-SQL-Injection.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit" ], "url": "http://seclists.org/fulldisclosure/2015/Jun/8" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/archive/1/535679/100/0/threaded" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/bid/75038" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://www.sysaid.com/blog/entry/sysaid-15-2-your-voice-your-service-desk" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-22" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2015-06-08 14:59
Modified
2024-11-21 02:28
Severity ?
Summary
SysAid Help Desk before 15.2 does not properly restrict access to certain functionality, which allows remote attackers to (1) create administrator accounts via a crafted request to /createnewaccount or (2) write to arbitrary files via the fileName parameter to /userentry.
References
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:sysaid:sysaid:*:*:*:*:*:*:*:*", "matchCriteriaId": "7733C5DB-1070-4A0E-99E9-14299634B65B", "versionEndIncluding": "15.1", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "SysAid Help Desk before 15.2 does not properly restrict access to certain functionality, which allows remote attackers to (1) create administrator accounts via a crafted request to /createnewaccount or (2) write to arbitrary files via the fileName parameter to /userentry." }, { "lang": "es", "value": "SysAid Help Desk anterior a 15.2 no restringe correctamente el acceso a cierta funcionalidad, lo que permite a atacantes remotos (1) crear cuentas de administradores a trav\u00e9s de una solicitud manipulada a /createnewaccount o (2) escribir en ficheros arbitrarios a trav\u00e9s del par\u00e1metro fileName en /userentry." } ], "id": "CVE-2015-2993", "lastModified": "2024-11-21T02:28:27.777", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2015-06-08T14:59:01.320", "references": [ { "source": "cve@mitre.org", "tags": [ "Exploit" ], "url": "http://packetstormsecurity.com/files/132138/SysAid-Help-Desk-14.4-Code-Execution-Denial-Of-Service-Traversal-SQL-Injection.html" }, { "source": "cve@mitre.org", "tags": [ "Exploit" ], "url": "http://seclists.org/fulldisclosure/2015/Jun/8" }, { "source": "cve@mitre.org", "url": "http://www.securityfocus.com/archive/1/535679/100/0/threaded" }, { "source": "cve@mitre.org", "url": "http://www.securityfocus.com/bid/75038" }, { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "https://www.sysaid.com/blog/entry/sysaid-15-2-your-voice-your-service-desk" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit" ], "url": "http://packetstormsecurity.com/files/132138/SysAid-Help-Desk-14.4-Code-Execution-Denial-Of-Service-Traversal-SQL-Injection.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit" ], "url": "http://seclists.org/fulldisclosure/2015/Jun/8" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/archive/1/535679/100/0/threaded" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/bid/75038" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://www.sysaid.com/blog/entry/sysaid-15-2-your-voice-your-service-desk" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-264" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2021-10-29 11:15
Modified
2024-11-21 06:06
Severity ?
Summary
SysAid 20.4.74 allows XSS via the KeepAlive.jsp stamp parameter without any authentication.
References
▼ | URL | Tags | |
---|---|---|---|
cve@mitre.org | https://github.com/RobertDra/CVE-2021-31862/blob/main/README.md | Exploit, Third Party Advisory | |
cve@mitre.org | https://www.sysaid.com/product/on-premise/latest-release | Release Notes, Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://github.com/RobertDra/CVE-2021-31862/blob/main/README.md | Exploit, Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://www.sysaid.com/product/on-premise/latest-release | Release Notes, Vendor Advisory |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:sysaid:sysaid:20.4.74:*:*:*:*:*:*:*", "matchCriteriaId": "77A7956C-2121-407B-8EC5-E0E1C85D97BE", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "SysAid 20.4.74 allows XSS via the KeepAlive.jsp stamp parameter without any authentication." }, { "lang": "es", "value": "SysAid versi\u00f3n 20.4.74, permite un ataque de tipo XSS por medio del par\u00e1metro de sello KeepAlive.jsp sin ninguna autenticaci\u00f3n" } ], "id": "CVE-2021-31862", "lastModified": "2024-11-21T06:06:22.557", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.1, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 2.7, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2021-10-29T11:15:08.477", "references": [ { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/RobertDra/CVE-2021-31862/blob/main/README.md" }, { "source": "cve@mitre.org", "tags": [ "Release Notes", "Vendor Advisory" ], "url": "https://www.sysaid.com/product/on-premise/latest-release" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/RobertDra/CVE-2021-31862/blob/main/README.md" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Release Notes", "Vendor Advisory" ], "url": "https://www.sysaid.com/product/on-premise/latest-release" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-79" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2022-05-12 20:15
Modified
2024-11-21 06:47
Severity ?
7.0 (High) - CVSS:3.1/AV:A/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:L
9.8 (Critical) - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
9.8 (Critical) - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Summary
Sysaid – Sysaid System Takeover - An attacker can bypass the authentication process by accessing to: /wmiwizard.jsp, Then to: /ConcurrentLogin.jsp, then click on the login button, and it will redirect you to /home.jsp without any authentication.
References
▼ | URL | Tags | |
---|---|---|---|
cna@cyber.gov.il | https://www.gov.il/en/departments/faq/cve_advisories | Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://www.gov.il/en/departments/faq/cve_advisories | Third Party Advisory |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:sysaid:sysaid:*:*:*:*:cloud:*:*:*", "matchCriteriaId": "1CD5FCED-F6DD-4AB6-9324-EB92FF8640E8", "versionEndExcluding": "21.1.30", "vulnerable": true }, { "criteria": "cpe:2.3:a:sysaid:sysaid:*:*:*:*:on-premises:*:*:*", "matchCriteriaId": "0F52FAE8-4CE0-4C38-A880-A990EE13C9B0", "versionEndExcluding": "21.4.45", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Sysaid \u2013 Sysaid System Takeover - An attacker can bypass the authentication process by accessing to: /wmiwizard.jsp, Then to: /ConcurrentLogin.jsp, then click on the login button, and it will redirect you to /home.jsp without any authentication." }, { "lang": "es", "value": "Sysaid - Sysaid Toma se Sistema - Un atacante puede omitir el proceso de autenticaci\u00f3n accediendo a: /wmiwizard.jsp, Luego a: /ConcurrentLogin.jsp, luego haciendo clic en el bot\u00f3n de inicio de sesi\u00f3n, y le redirigir\u00e1 a /home.jsp sin ninguna autenticaci\u00f3n" } ], "id": "CVE-2022-22796", "lastModified": "2024-11-21T06:47:28.293", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 10.0, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 10.0, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "ADJACENT_NETWORK", "availabilityImpact": "LOW", "baseScore": 7.0, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:A/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:L", "version": "3.1" }, "exploitabilityScore": 1.5, "impactScore": 5.5, "source": "cna@cyber.gov.il", "type": "Secondary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2022-05-12T20:15:14.847", "references": [ { "source": "cna@cyber.gov.il", "tags": [ "Third Party Advisory" ], "url": "https://www.gov.il/en/departments/faq/cve_advisories" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://www.gov.il/en/departments/faq/cve_advisories" } ], "sourceIdentifier": "cna@cyber.gov.il", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-287" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2024-06-06 09:15
Modified
2024-11-21 09:22
Severity ?
9.9 (Critical) - CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H
9.8 (Critical) - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
9.8 (Critical) - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Summary
SysAid - CWE-89: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')
References
▼ | URL | Tags | |
---|---|---|---|
cna@cyber.gov.il | https://www.gov.il/en/Departments/faq/cve_advisories | Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://www.gov.il/en/Departments/faq/cve_advisories | Third Party Advisory |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:sysaid:sysaid:*:*:*:*:on-premises:*:*:*", "matchCriteriaId": "860CE587-F45B-47BC-A88D-00B4B8C51C1F", "versionEndIncluding": "23.3.38", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "SysAid - CWE-89: Improper Neutralization of Special Elements used in an SQL Command (\u0027SQL Injection\u0027)" }, { "lang": "es", "value": "SysAid - CWE-89: Neutralizaci\u00f3n inadecuada de elementos especiales utilizados en un comando SQL (\"Inyecci\u00f3n SQL\")" } ], "id": "CVE-2024-36393", "lastModified": "2024-11-21T09:22:05.170", "metrics": { "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.9, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 3.1, "impactScore": 6.0, "source": "cna@cyber.gov.il", "type": "Secondary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2024-06-06T09:15:14.420", "references": [ { "source": "cna@cyber.gov.il", "tags": [ "Third Party Advisory" ], "url": "https://www.gov.il/en/Departments/faq/cve_advisories" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://www.gov.il/en/Departments/faq/cve_advisories" } ], "sourceIdentifier": "cna@cyber.gov.il", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-89" } ], "source": "cna@cyber.gov.il", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2023-11-10 06:15
Modified
2024-12-20 17:20
Severity ?
9.8 (Critical) - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
9.8 (Critical) - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
9.8 (Critical) - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Summary
In SysAid On-Premise before 23.3.36, a path traversal vulnerability leads to code execution after an attacker writes a file to the Tomcat webroot, as exploited in the wild in November 2023.
References
{ "cisaActionDue": "2023-12-04", "cisaExploitAdd": "2023-11-13", "cisaRequiredAction": "Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.", "cisaVulnerabilityName": "SysAid Server Path Traversal Vulnerability", "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:sysaid:sysaid:*:*:*:*:on-premises:*:*:*", "matchCriteriaId": "239AAC8E-10BF-4280-8BEB-F85F71670F5B", "versionEndExcluding": "23.3.36", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "In SysAid On-Premise before 23.3.36, a path traversal vulnerability leads to code execution after an attacker writes a file to the Tomcat webroot, as exploited in the wild in November 2023." }, { "lang": "es", "value": "En SysAid On-Premise anterior al 23.3.36, una vulnerabilidad de path traversal conduce a la ejecuci\u00f3n de c\u00f3digo despu\u00e9s de que un atacante escribe un archivo en la ra\u00edz web de Tomcat, tal como se explot\u00f3 en noviembre de 2023." } ], "id": "CVE-2023-47246", "lastModified": "2024-12-20T17:20:48.827", "metrics": { "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 5.9, "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary" } ] }, "published": "2023-11-10T06:15:30.510", "references": [ { "source": "cve@mitre.org", "tags": [ "Product" ], "url": "https://documentation.sysaid.com/docs/latest-version-installation-files" }, { "source": "cve@mitre.org", "tags": [ "Release Notes", "Vendor Advisory" ], "url": "https://documentation.sysaid.com/docs/on-premise-security-enhancements-2023" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Vendor Advisory" ], "url": "https://www.sysaid.com/blog/service-desk/on-premise-software-security-vulnerability-notification" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Product" ], "url": "https://documentation.sysaid.com/docs/latest-version-installation-files" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Release Notes", "Vendor Advisory" ], "url": "https://documentation.sysaid.com/docs/on-premise-security-enhancements-2023" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Vendor Advisory" ], "url": "https://www.sysaid.com/blog/service-desk/on-premise-software-security-vulnerability-notification" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Analyzed", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-22" } ], "source": "nvd@nist.gov", "type": "Primary" }, { "description": [ { "lang": "en", "value": "CWE-22" } ], "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary" } ] }
Vulnerability from fkie_nvd
Published
2015-01-02 19:59
Modified
2024-11-21 02:20
Severity ?
Summary
Absolute path traversal vulnerability in SysAid On-Premise before 14.4.2 allows remote attackers to read arbitrary files via a \\\\ (four backslashes) in the fileName parameter to getRdsLogFile.
References
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:sysaid:sysaid:*:*:*:*:*:*:*:*", "matchCriteriaId": "0E632637-1A4B-469B-9295-3C8B49314950", "versionEndIncluding": "14.4", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Absolute path traversal vulnerability in SysAid On-Premise before 14.4.2 allows remote attackers to read arbitrary files via a \\\\\\\\ (four backslashes) in the fileName parameter to getRdsLogFile." }, { "lang": "es", "value": "Vulnerabilidad de recorrido de directorio absoluto en SysAid On-Premise anterior a 14.4.2 permite a atacantes remotos leer ficheros arbitrarios a trav\u00e9s de un \\\\\\\\ (cuatro barras invertidas) en el par\u00e1metro fileName en getRdsLogFile." } ], "id": "CVE-2014-9436", "lastModified": "2024-11-21T02:20:53.213", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2015-01-02T19:59:05.187", "references": [ { "source": "cve@mitre.org", "tags": [ "Exploit" ], "url": "http://packetstormsecurity.com/files/129705/SysAid-Server-Arbitrary-File-Disclosure.html" }, { "source": "cve@mitre.org", "tags": [ "Exploit" ], "url": "http://seclists.org/fulldisclosure/2014/Dec/99" }, { "source": "cve@mitre.org", "tags": [ "Exploit" ], "url": "http://www.exploit-db.com/exploits/35593" }, { "source": "cve@mitre.org", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/99456" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit" ], "url": "http://packetstormsecurity.com/files/129705/SysAid-Server-Arbitrary-File-Disclosure.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit" ], "url": "http://seclists.org/fulldisclosure/2014/Dec/99" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit" ], "url": "http://www.exploit-db.com/exploits/35593" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/99456" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-22" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2022-01-11 20:15
Modified
2024-11-21 06:30
Severity ?
Summary
An unrestricted file upload vulnerability in /UploadPsIcon.jsp in SysAid ITIL 20.4.74 b10 allows a remote authenticated attacker to upload an arbitrary file via the file parameter in the HTTP POST body. A successful request returns the absolute, server-side filesystem path of the uploaded file.
References
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:sysaid:sysaid:20.4.74:b10:*:*:*:*:*:*", "matchCriteriaId": "7E42FC83-655D-4C66-8B6F-759B3C164D07", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "An unrestricted file upload vulnerability in /UploadPsIcon.jsp in SysAid ITIL 20.4.74 b10 allows a remote authenticated attacker to upload an arbitrary file via the file parameter in the HTTP POST body. A successful request returns the absolute, server-side filesystem path of the uploaded file." }, { "lang": "es", "value": "Una vulnerabilidad de carga de archivos sin restricciones en el archivo /UploadPsIcon.jsp en SysAid ITIL versi\u00f3n 20.4.74 b10, permite a un atacante remoto autenticado cargar un archivo arbitrario por medio del par\u00e1metro file en el cuerpo HTTP POST. Una petici\u00f3n con \u00e9xito devuelve la ruta absoluta del sistema de archivos del lado del servidor del archivo cargado" } ], "id": "CVE-2021-43973", "lastModified": "2024-11-21T06:30:06.773", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "PARTIAL", "baseScore": 6.5, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 8.0, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2022-01-11T20:15:07.667", "references": [ { "source": "cve@mitre.org", "tags": [ "Broken Link" ], "url": "https://github.com/atredispartners/advisories/blob/master/ATREDIS-2021-0002.md" }, { "source": "cve@mitre.org", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/atredispartners/advisories/blob/master/ATREDIS-2022-0001.md" }, { "source": "cve@mitre.org", "tags": [ "Product" ], "url": "https://www.sysaid.com/it-service-management-software/incident-management" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Broken Link" ], "url": "https://github.com/atredispartners/advisories/blob/master/ATREDIS-2021-0002.md" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/atredispartners/advisories/blob/master/ATREDIS-2022-0001.md" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Product" ], "url": "https://www.sysaid.com/it-service-management-software/incident-management" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-434" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2022-05-12 20:15
Modified
2024-11-21 06:48
Severity ?
5.5 (Medium) - CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:L/A:L
6.1 (Medium) - CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
6.1 (Medium) - CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
Summary
Sysaid – Sysaid 14.2.0 Reflected Cross-Site Scripting (XSS) - The parameter "helpPageName" used by the page "/help/treecontent.jsp" suffers from a Reflected Cross-Site Scripting vulnerability. For an attacker to exploit this Cross-Site Scripting vulnerability, it's necessary for the affected product to expose the Offline Help Pages. An attacker may gain access to sensitive information or execute client-side code in the browser session of the victim user. Furthermore, an attacker would require the victim to open a malicious link. An attacker may exploit this vulnerability in order to perform phishing attacks. The attacker can receive sensitive data like server details, usernames, workstations, etc. He can also perform actions such as uploading files, deleting calls from the system
References
▼ | URL | Tags | |
---|---|---|---|
cna@cyber.gov.il | https://www.gov.il/en/departments/faq/cve_advisories | Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://www.gov.il/en/departments/faq/cve_advisories | Third Party Advisory |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:sysaid:sysaid:*:*:*:*:on-premises:*:*:*", "matchCriteriaId": "2705AD15-BD6F-4F05-8826-894DA3428679", "versionEndExcluding": "22.1.64", "vulnerable": true }, { "criteria": "cpe:2.3:a:sysaid:sysaid:*:*:*:*:cloud:*:*:*", "matchCriteriaId": "1421E8E9-535B-483B-93AB-49D244550327", "versionEndExcluding": "22.2.20", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Sysaid \u2013 Sysaid 14.2.0 Reflected Cross-Site Scripting (XSS) - The parameter \"helpPageName\" used by the page \"/help/treecontent.jsp\" suffers from a Reflected Cross-Site Scripting vulnerability. For an attacker to exploit this Cross-Site Scripting vulnerability, it\u0027s necessary for the affected product to expose the Offline Help Pages. An attacker may gain access to sensitive information or execute client-side code in the browser session of the victim user. Furthermore, an attacker would require the victim to open a malicious link. An attacker may exploit this vulnerability in order to perform phishing attacks. The attacker can receive sensitive data like server details, usernames, workstations, etc. He can also perform actions such as uploading files, deleting calls from the system" }, { "lang": "es", "value": "Sysaid - Sysaid versi\u00f3n 14.2.0 Cross-Site Scripting (XSS) Reflejado - El par\u00e1metro \"helpPageName\" usado por la p\u00e1gina \"/help/treecontent.jsp\" sufre una vulnerabilidad de tipo Cross-Site Scripting Reflejado. Para que un atacante pueda explotar esta vulnerabilidad de tipo Cross-Site Scripting, es necesario que el producto afectado exponga las p\u00e1ginas de ayuda sin conexi\u00f3n. Un atacante podr\u00eda conseguir acceso a informaci\u00f3n confidencial o ejecutar c\u00f3digo del lado del cliente en la sesi\u00f3n del navegador del usuario v\u00edctima. Adem\u00e1s, un atacante requerir\u00eda que la v\u00edctima abriera un enlace malicioso. Un atacante puede explotar esta vulnerabilidad para llevar a cabo ataques de phishing. El atacante puede recibir datos confidenciales como detalles del servidor, nombres de usuario, estaciones de trabajo, etc. Tambi\u00e9n puede llevar a cabo acciones como la carga de archivos, la eliminaci\u00f3n de llamadas del sistema" } ], "id": "CVE-2022-23165", "lastModified": "2024-11-21T06:48:06.810", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "HIGH", "attackVector": "LOCAL", "availabilityImpact": "LOW", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "LOW", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:L/A:L", "version": "3.1" }, "exploitabilityScore": 0.8, "impactScore": 4.7, "source": "cna@cyber.gov.il", "type": "Secondary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.1, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 2.7, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2022-05-12T20:15:15.240", "references": [ { "source": "cna@cyber.gov.il", "tags": [ "Third Party Advisory" ], "url": "https://www.gov.il/en/departments/faq/cve_advisories" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://www.gov.il/en/departments/faq/cve_advisories" } ], "sourceIdentifier": "cna@cyber.gov.il", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-79" } ], "source": "cna@cyber.gov.il", "type": "Secondary" }, { "description": [ { "lang": "en", "value": "CWE-79" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2022-05-12 20:15
Modified
2024-11-21 06:47
Severity ?
6.8 (Medium) - CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:L
8.8 (High) - CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
8.8 (High) - CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
Summary
Sysaid – Pro Plus Edition, SysAid Help Desk Broken Access Control v20.4.74 b10, v22.1.20 b62, v22.1.30 b49 - An attacker needs to log in as a guest after that the system redirects him to the service portal or EndUserPortal.JSP, then he needs to change the path in the URL to /ConcurrentLogin%2ejsp after that he will receive an error message with a login button, by clicking on it, he will connect to the system dashboard. The attacker can receive sensitive data like server details, usernames, workstations, etc. He can also perform actions such as uploading files, deleting calls from the system.
References
▼ | URL | Tags | |
---|---|---|---|
cna@cyber.gov.il | https://www.gov.il/en/departments/faq/cve_advisories | Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://www.gov.il/en/departments/faq/cve_advisories | Third Party Advisory |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:sysaid:sysaid:*:*:*:*:cloud:*:*:*", "matchCriteriaId": "A4097469-83BC-4F87-BF20-031FB8B04B9A", "versionEndExcluding": "21.1.50", "vulnerable": true }, { "criteria": "cpe:2.3:a:sysaid:sysaid:*:*:*:*:on-premises:*:*:*", "matchCriteriaId": "2705AD15-BD6F-4F05-8826-894DA3428679", "versionEndExcluding": "22.1.64", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Sysaid \u2013 Pro Plus Edition, SysAid Help Desk Broken Access Control v20.4.74 b10, v22.1.20 b62, v22.1.30 b49 - An attacker needs to log in as a guest after that the system redirects him to the service portal or EndUserPortal.JSP, then he needs to change the path in the URL to /ConcurrentLogin%2ejsp after that he will receive an error message with a login button, by clicking on it, he will connect to the system dashboard. The attacker can receive sensitive data like server details, usernames, workstations, etc. He can also perform actions such as uploading files, deleting calls from the system." }, { "lang": "es", "value": "Sysaid - Pro Plus Edition, SysAid Help Desk Broken Access Control versiones v20.4.74 b10, v22.1.20 b62, v22.1.30 b49 - Un atacante necesita iniciar sesi\u00f3n como invitado, despu\u00e9s de lo cual el sistema lo redirige al portal de servicios o EndUserPortal.JSP, luego necesita cambiar la ruta en la URL a /ConcurrentLogin%2ejsp, despu\u00e9s de lo cual recibir\u00e1 un mensaje de error con un bot\u00f3n de inicio de sesi\u00f3n, al hacer clic en \u00e9l, ser\u00e1 conectado al tablero del sistema. El atacante puede recibir datos confidenciales como detalles del servidor, nombres de usuario, estaciones de trabajo, etc. Tambi\u00e9n puede llevar a cabo acciones como la carga de archivos o la eliminaci\u00f3n de llamadas del sistema" } ], "id": "CVE-2022-22798", "lastModified": "2024-11-21T06:47:28.560", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "COMPLETE", "baseScore": 9.0, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:N/AC:L/Au:S/C:C/I:C/A:C", "version": "2.0" }, "exploitabilityScore": 8.0, "impactScore": 10.0, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "LOW", "baseScore": 6.8, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:L", "version": "3.1" }, "exploitabilityScore": 1.3, "impactScore": 5.5, "source": "cna@cyber.gov.il", "type": "Secondary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2022-05-12T20:15:14.977", "references": [ { "source": "cna@cyber.gov.il", "tags": [ "Third Party Advisory" ], "url": "https://www.gov.il/en/departments/faq/cve_advisories" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://www.gov.il/en/departments/faq/cve_advisories" } ], "sourceIdentifier": "cna@cyber.gov.il", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "NVD-CWE-Other" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2022-01-11 20:15
Modified
2024-11-21 06:30
Severity ?
Summary
A SQL injection vulnerability in /mobile/SelectUsers.jsp in SysAid ITIL 20.4.74 b10 allows a remote authenticated attacker to execute arbitrary SQL commands via the filterText parameter.
References
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:sysaid:sysaid:20.4.74:b10:*:*:*:*:*:*", "matchCriteriaId": "7E42FC83-655D-4C66-8B6F-759B3C164D07", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "A SQL injection vulnerability in /mobile/SelectUsers.jsp in SysAid ITIL 20.4.74 b10 allows a remote authenticated attacker to execute arbitrary SQL commands via the filterText parameter." }, { "lang": "es", "value": "Una vulnerabilidad de inyecci\u00f3n SQL en el archivo /mobile/SelectUsers.jsp en SysAid ITIL versi\u00f3n 20.4.74 b10, permite a un atacante remoto autenticado ejecutar comandos SQL arbitrarios por medio del par\u00e1metro filterText" } ], "id": "CVE-2021-43971", "lastModified": "2024-11-21T06:30:06.430", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "PARTIAL", "baseScore": 6.5, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 8.0, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2022-01-11T20:15:07.580", "references": [ { "source": "cve@mitre.org", "tags": [ "Broken Link" ], "url": "https://github.com/atredispartners/advisories/blob/master/ATREDIS-2021-0002.md" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/atredispartners/advisories/blob/master/ATREDIS-2022-0001.md" }, { "source": "cve@mitre.org", "tags": [ "Product" ], "url": "https://www.sysaid.com/it-service-management-software/incident-management" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Broken Link" ], "url": "https://github.com/atredispartners/advisories/blob/master/ATREDIS-2021-0002.md" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/atredispartners/advisories/blob/master/ATREDIS-2022-0001.md" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Product" ], "url": "https://www.sysaid.com/it-service-management-software/incident-management" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-89" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2023-12-25 07:15
Modified
2024-11-21 08:30
Severity ?
Summary
In SysAid On-Premise before 23.3.34, there is an edge case in which an end user is able to delete a Knowledge Base article, aka bug 15102.
References
▼ | URL | Tags | |
---|---|---|---|
cve@mitre.org | https://documentation.sysaid.com/docs/23334 | Release Notes | |
af854a3a-2127-422b-91ae-364da2661108 | https://documentation.sysaid.com/docs/23334 | Release Notes |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:sysaid:sysaid:*:*:*:*:on-premises:*:*:*", "matchCriteriaId": "F1C45367-25C1-4DB2-8D17-BDC07600FD47", "versionEndExcluding": "23.3.34", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "In SysAid On-Premise before 23.3.34, there is an edge case in which an end user is able to delete a Knowledge Base article, aka bug 15102." }, { "lang": "es", "value": "En SysAid On-Premise anterior al 23.3.34, hay un caso extremo en el que un usuario final puede eliminar un art\u00edculo de la base de conocimientos, tambi\u00e9n conocido como error 15102." } ], "id": "CVE-2023-47247", "lastModified": "2024-11-21T08:30:02.280", "metrics": { "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 4.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "LOW", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 1.4, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2023-12-25T07:15:09.683", "references": [ { "source": "cve@mitre.org", "tags": [ "Release Notes" ], "url": "https://documentation.sysaid.com/docs/23334" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Release Notes" ], "url": "https://documentation.sysaid.com/docs/23334" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "NVD-CWE-noinfo" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2015-06-08 14:59
Modified
2024-11-21 02:28
Severity ?
Summary
Unrestricted file upload vulnerability in ChangePhoto.jsp in SysAid Help Desk before 15.2 allows remote administrators to execute arbitrary code by uploading a file with a .jsp extension, then accessing it via a direct request to the file in icons/user_photo/.
References
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:sysaid:sysaid:*:*:*:*:*:*:*:*", "matchCriteriaId": "7733C5DB-1070-4A0E-99E9-14299634B65B", "versionEndIncluding": "15.1", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Unrestricted file upload vulnerability in ChangePhoto.jsp in SysAid Help Desk before 15.2 allows remote administrators to execute arbitrary code by uploading a file with a .jsp extension, then accessing it via a direct request to the file in icons/user_photo/." }, { "lang": "es", "value": "Vulnerabilidad de la subida de ficheros sin restricciones en ChangePhoto.jsp en SysAid Help Desk anterior a 15.2 permite a administradores remotos ejecutar c\u00f3digo arbitrario mediante la subida de un fichero con una extensi\u00f3n .jsp, y posteriormente accediendo a ello a trav\u00e9s de una solicitud directa al fichero en icons/user_photo/." } ], "evaluatorComment": "\u003ca href=\"http://cwe.mitre.org/data/definitions/434.html\"\u003eCWE-434: Unrestricted Upload of File with Dangerous Type\u003c/a\u003e", "id": "CVE-2015-2994", "lastModified": "2024-11-21T02:28:27.927", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "PARTIAL", "baseScore": 6.5, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 8.0, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2015-06-08T14:59:02.587", "references": [ { "source": "cve@mitre.org", "tags": [ "Exploit" ], "url": "http://packetstormsecurity.com/files/132138/SysAid-Help-Desk-14.4-Code-Execution-Denial-Of-Service-Traversal-SQL-Injection.html" }, { "source": "cve@mitre.org", "tags": [ "Exploit" ], "url": "http://seclists.org/fulldisclosure/2015/Jun/8" }, { "source": "cve@mitre.org", "url": "http://www.securityfocus.com/archive/1/535679/100/0/threaded" }, { "source": "cve@mitre.org", "url": "http://www.securityfocus.com/bid/75038" }, { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "https://www.sysaid.com/blog/entry/sysaid-15-2-your-voice-your-service-desk" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit" ], "url": "http://packetstormsecurity.com/files/132138/SysAid-Help-Desk-14.4-Code-Execution-Denial-Of-Service-Traversal-SQL-Injection.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit" ], "url": "http://seclists.org/fulldisclosure/2015/Jun/8" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/archive/1/535679/100/0/threaded" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/bid/75038" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://www.sysaid.com/blog/entry/sysaid-15-2-your-voice-your-service-desk" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "NVD-CWE-Other" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2015-06-08 14:59
Modified
2024-11-21 02:28
Severity ?
Summary
SysAid Help Desk before 15.2 uses a hardcoded encryption key, which makes it easier for remote attackers to obtain sensitive information, as demonstrated by decrypting the database password in WEB-INF/conf/serverConf.xml.
References
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:sysaid:sysaid:*:*:*:*:*:*:*:*", "matchCriteriaId": "7733C5DB-1070-4A0E-99E9-14299634B65B", "versionEndIncluding": "15.1", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "SysAid Help Desk before 15.2 uses a hardcoded encryption key, which makes it easier for remote attackers to obtain sensitive information, as demonstrated by decrypting the database password in WEB-INF/conf/serverConf.xml." }, { "lang": "es", "value": "SysAid Help Desk anterior a 15.2 utiliza una clave de cifrado embebido, lo que facilita a atacantes remotos obtener informaci\u00f3n sensible, tal y como fue demostrado mediante la descifrado de la contrase\u00f1a de la base de datos en WEB-INF/conf/serverConf.xml." } ], "id": "CVE-2015-2998", "lastModified": "2024-11-21T02:28:28.543", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2015-06-08T14:59:06.650", "references": [ { "source": "cve@mitre.org", "tags": [ "Exploit" ], "url": "http://packetstormsecurity.com/files/132138/SysAid-Help-Desk-14.4-Code-Execution-Denial-Of-Service-Traversal-SQL-Injection.html" }, { "source": "cve@mitre.org", "tags": [ "Exploit" ], "url": "http://seclists.org/fulldisclosure/2015/Jun/8" }, { "source": "cve@mitre.org", "url": "http://www.securityfocus.com/archive/1/535679/100/0/threaded" }, { "source": "cve@mitre.org", "url": "http://www.securityfocus.com/bid/75035" }, { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "https://www.sysaid.com/blog/entry/sysaid-15-2-your-voice-your-service-desk" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit" ], "url": "http://packetstormsecurity.com/files/132138/SysAid-Help-Desk-14.4-Code-Execution-Denial-Of-Service-Traversal-SQL-Injection.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit" ], "url": "http://seclists.org/fulldisclosure/2015/Jun/8" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/archive/1/535679/100/0/threaded" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/bid/75035" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://www.sysaid.com/blog/entry/sysaid-15-2-your-voice-your-service-desk" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-200" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2021-07-22 12:15
Modified
2024-11-21 06:04
Severity ?
Summary
SysAid 20.3.64 b14 is affected by Blind and Stacker SQL injection via AssetManagementChart.jsp (GET computerID), AssetManagementChart.jsp (POST group1), AssetManagementList.jsp (GET computerID or group1), or AssetManagementSummary.jsp (GET group1).
References
▼ | URL | Tags | |
---|---|---|---|
cve@mitre.org | https://eh337.net/2021/04/10/sysaid-ii/ | Exploit, Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://eh337.net/2021/04/10/sysaid-ii/ | Exploit, Third Party Advisory |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:sysaid:sysaid:20.3.64:b14:*:*:*:*:*:*", "matchCriteriaId": "06922BD5-0FBB-4E29-8BDA-8DF30E11F448", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "SysAid 20.3.64 b14 is affected by Blind and Stacker SQL injection via AssetManagementChart.jsp (GET computerID), AssetManagementChart.jsp (POST group1), AssetManagementList.jsp (GET computerID or group1), or AssetManagementSummary.jsp (GET group1)." }, { "lang": "es", "value": "SysAid versi\u00f3n 20.3.64 b14, est\u00e1 afectado por una inyecci\u00f3n SQL de Blind y Stacker por medio de los archivos AssetManagementChart.jsp (GET computerID), AssetManagementChart.jsp (POST group1), AssetManagementList.jsp (GET computerID o group1), o AssetManagementSummary.jsp (GET group1)" } ], "id": "CVE-2021-30486", "lastModified": "2024-11-21T06:04:01.380", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "PARTIAL", "baseScore": 6.5, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 8.0, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2021-07-22T12:15:07.927", "references": [ { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://eh337.net/2021/04/10/sysaid-ii/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://eh337.net/2021/04/10/sysaid-ii/" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-89" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2022-05-12 20:15
Modified
2024-11-21 06:47
Severity ?
4.6 (Medium) - CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N
6.1 (Medium) - CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
6.1 (Medium) - CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
Summary
Sysaid – sysaid Open Redirect - An Attacker can change the redirect link at the parameter "redirectURL" from"GET" request from the url location: /CommunitySSORedirect.jsp?redirectURL=https://google.com. Unvalidated redirects and forwards are possible when a web application accepts untrusted input that could cause the web application to redirect the request to a URL contained within untrusted input. By modifying untrusted URL input to a malicious site, an attacker may successfully launch a phishing scam and steal user credentials.
References
▼ | URL | Tags | |
---|---|---|---|
cna@cyber.gov.il | https://www.gov.il/en/departments/faq/cve_advisories | Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://www.gov.il/en/departments/faq/cve_advisories | Third Party Advisory |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:sysaid:sysaid:*:*:*:*:cloud:*:*:*", "matchCriteriaId": "702AE9EF-5506-4CFF-BCE4-E6E9C2214644", "versionEndExcluding": "22.1.50", "vulnerable": true }, { "criteria": "cpe:2.3:a:sysaid:sysaid:*:*:*:*:on-premises:*:*:*", "matchCriteriaId": "2705AD15-BD6F-4F05-8826-894DA3428679", "versionEndExcluding": "22.1.64", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Sysaid \u2013 sysaid Open Redirect - An Attacker can change the redirect link at the parameter \"redirectURL\" from\"GET\" request from the url location: /CommunitySSORedirect.jsp?redirectURL=https://google.com. Unvalidated redirects and forwards are possible when a web application accepts untrusted input that could cause the web application to redirect the request to a URL contained within untrusted input. By modifying untrusted URL input to a malicious site, an attacker may successfully launch a phishing scam and steal user credentials." }, { "lang": "es", "value": "Sysaid - sysaid Redireccionamiento Abierto - Un atacante puede cambiar el enlace de redireccionamiento en el par\u00e1metro \"redirectURL\" de la petici\u00f3n \"GET\" desde la ubicaci\u00f3n de la url: /ComunidadSSORedirect.jsp?redirectURL=https://google.com. Los redireccionamientos y reenv\u00edos no comprobados son posibles cuando una aplicaci\u00f3n web acepta una entrada no confiable que podr\u00eda causar que la aplicaci\u00f3n web redirija la petici\u00f3n a una URL contenida en una entrada no confiable. Al modificar la entrada de la URL no confiable a un sitio malicioso, un atacante puede lanzar con \u00e9xito una estafa de phishing y robar las credenciales del usuario" } ], "id": "CVE-2022-22797", "lastModified": "2024-11-21T06:47:28.423", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 5.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:N", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 4.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 4.6, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "LOW", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", "version": "3.1" }, "exploitabilityScore": 1.5, "impactScore": 2.7, "source": "cna@cyber.gov.il", "type": "Secondary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.1, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 2.7, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2022-05-12T20:15:14.913", "references": [ { "source": "cna@cyber.gov.il", "tags": [ "Third Party Advisory" ], "url": "https://www.gov.il/en/departments/faq/cve_advisories" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://www.gov.il/en/departments/faq/cve_advisories" } ], "sourceIdentifier": "cna@cyber.gov.il", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-601" } ], "source": "cna@cyber.gov.il", "type": "Secondary" }, { "description": [ { "lang": "en", "value": "CWE-601" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2015-06-08 14:59
Modified
2024-11-21 02:28
Severity ?
Summary
SysAid Help Desk before 15.2 allows remote attackers to obtain sensitive information via an invalid value in the accountid parameter to getAgentLogFile, as demonstrated by a large directory traversal sequence, which reveals the installation path in an error message.
References
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:sysaid:sysaid:*:*:*:*:*:*:*:*", "matchCriteriaId": "7733C5DB-1070-4A0E-99E9-14299634B65B", "versionEndIncluding": "15.1", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "SysAid Help Desk before 15.2 allows remote attackers to obtain sensitive information via an invalid value in the accountid parameter to getAgentLogFile, as demonstrated by a large directory traversal sequence, which reveals the installation path in an error message." }, { "lang": "es", "value": "SysAid Help Desk anterior a 15.2 permite a atacantes remotos obtener informaci\u00f3n sensible a trav\u00e9s de un valor inv\u00e1lido en el par\u00e1metro accountid en getAgentLogFile, tal y como fue demostrado por una secuencia grande de salto de directorio, lo que revela la ruta de instalaci\u00f3n en un mensaje de error." } ], "id": "CVE-2015-2997", "lastModified": "2024-11-21T02:28:28.390", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2015-06-08T14:59:05.650", "references": [ { "source": "cve@mitre.org", "tags": [ "Exploit" ], "url": "http://packetstormsecurity.com/files/132138/SysAid-Help-Desk-14.4-Code-Execution-Denial-Of-Service-Traversal-SQL-Injection.html" }, { "source": "cve@mitre.org", "tags": [ "Exploit" ], "url": "http://seclists.org/fulldisclosure/2015/Jun/8" }, { "source": "cve@mitre.org", "url": "http://www.securityfocus.com/archive/1/535679/100/0/threaded" }, { "source": "cve@mitre.org", "url": "http://www.securityfocus.com/bid/75038" }, { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "https://www.sysaid.com/blog/entry/sysaid-15-2-your-voice-your-service-desk" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit" ], "url": "http://packetstormsecurity.com/files/132138/SysAid-Help-Desk-14.4-Code-Execution-Denial-Of-Service-Traversal-SQL-Injection.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit" ], "url": "http://seclists.org/fulldisclosure/2015/Jun/8" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/archive/1/535679/100/0/threaded" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/bid/75038" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://www.sysaid.com/blog/entry/sysaid-15-2-your-voice-your-service-desk" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-200" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2015-06-08 14:59
Modified
2024-11-21 02:28
Severity ?
Summary
Multiple SQL injection vulnerabilities in SysAid Help Desk before 15.2 allow remote administrators to execute arbitrary SQL commands via the (1) groupFilter parameter in an AssetDetails report to /genericreport, customSQL parameter in a (2) TopAdministratorsByAverageTimer report or an (3) ActiveRequests report to /genericreport, (4) dir parameter to HelpDesk.jsp, or (5) grantSQL parameter to RFCGantt.jsp.
References
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:sysaid:sysaid:*:*:*:*:*:*:*:*", "matchCriteriaId": "7733C5DB-1070-4A0E-99E9-14299634B65B", "versionEndIncluding": "15.1", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Multiple SQL injection vulnerabilities in SysAid Help Desk before 15.2 allow remote administrators to execute arbitrary SQL commands via the (1) groupFilter parameter in an AssetDetails report to /genericreport, customSQL parameter in a (2) TopAdministratorsByAverageTimer report or an (3) ActiveRequests report to /genericreport, (4) dir parameter to HelpDesk.jsp, or (5) grantSQL parameter to RFCGantt.jsp." }, { "lang": "es", "value": "M\u00faltiples vulnerabilidades de inyecci\u00f3n SQL en SysAid Help Desk anterior a 15.2 permiten a administradores remotos ejecutar comandos SQL arbitrarios a trav\u00e9s (1) del par\u00e1metro groupFilter en un informe AssetDetails en /genericreport, del par\u00e1metro customSQL en (2) un informe TopAdministratorsByAverageTimer o (3) un informe ActiveRequests en /genericreport, (4) del par\u00e1metro dir en HelpDesk.jsp, o (5) del par\u00e1metro grantSQL en RFCGantt.jsp." } ], "id": "CVE-2015-2999", "lastModified": "2024-11-21T02:28:28.690", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "PARTIAL", "baseScore": 6.5, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 8.0, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2015-06-08T14:59:07.540", "references": [ { "source": "cve@mitre.org", "tags": [ "Exploit" ], "url": "http://packetstormsecurity.com/files/132138/SysAid-Help-Desk-14.4-Code-Execution-Denial-Of-Service-Traversal-SQL-Injection.html" }, { "source": "cve@mitre.org", "tags": [ "Exploit" ], "url": "http://seclists.org/fulldisclosure/2015/Jun/8" }, { "source": "cve@mitre.org", "url": "http://www.securityfocus.com/archive/1/535679/100/0/threaded" }, { "source": "cve@mitre.org", "url": "http://www.securityfocus.com/bid/75038" }, { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "https://www.sysaid.com/blog/entry/sysaid-15-2-your-voice-your-service-desk" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit" ], "url": "http://packetstormsecurity.com/files/132138/SysAid-Help-Desk-14.4-Code-Execution-Denial-Of-Service-Traversal-SQL-Injection.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit" ], "url": "http://seclists.org/fulldisclosure/2015/Jun/8" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/archive/1/535679/100/0/threaded" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/bid/75038" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://www.sysaid.com/blog/entry/sysaid-15-2-your-voice-your-service-desk" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-89" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2022-01-11 20:15
Modified
2024-11-21 06:30
Severity ?
Summary
An unrestricted file copy vulnerability in /UserSelfServiceSettings.jsp in SysAid ITIL 20.4.74 b10 allows a remote authenticated attacker to copy arbitrary files on the server filesystem to the web root (with an arbitrary filename) via the tempFile and fileName parameters in the HTTP POST body.
References
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:sysaid:sysaid:20.4.74:b10:*:*:*:*:*:*", "matchCriteriaId": "7E42FC83-655D-4C66-8B6F-759B3C164D07", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "An unrestricted file copy vulnerability in /UserSelfServiceSettings.jsp in SysAid ITIL 20.4.74 b10 allows a remote authenticated attacker to copy arbitrary files on the server filesystem to the web root (with an arbitrary filename) via the tempFile and fileName parameters in the HTTP POST body." }, { "lang": "es", "value": "Una vulnerabilidad de copia de archivos sin restricciones en el archivo /UserSelfServiceSettings.jsp en SysAid ITIL versi\u00f3n 20.4.74 b10, permite a un atacante remoto autenticado copiar archivos arbitrarios en el sistema de archivos del servidor al root de la web (con un nombre de archivo arbitrario) por medio de los par\u00e1metros tempFile y fileName en el cuerpo HTTP POST" } ], "id": "CVE-2021-43972", "lastModified": "2024-11-21T06:30:06.613", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "NONE", "baseScore": 6.8, "confidentialityImpact": "NONE", "integrityImpact": "COMPLETE", "vectorString": "AV:N/AC:L/Au:S/C:N/I:C/A:N", "version": "2.0" }, "exploitabilityScore": 8.0, "impactScore": 6.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2022-01-11T20:15:07.620", "references": [ { "source": "cve@mitre.org", "tags": [ "Broken Link" ], "url": "https://github.com/atredispartners/advisories/blob/master/ATREDIS-2021-0002.md" }, { "source": "cve@mitre.org", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/atredispartners/advisories/blob/master/ATREDIS-2022-0001.md" }, { "source": "cve@mitre.org", "tags": [ "Product" ], "url": "https://www.sysaid.com/it-service-management-software/incident-management" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Broken Link" ], "url": "https://github.com/atredispartners/advisories/blob/master/ATREDIS-2021-0002.md" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/atredispartners/advisories/blob/master/ATREDIS-2022-0001.md" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Product" ], "url": "https://www.sysaid.com/it-service-management-software/incident-management" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "NVD-CWE-Other" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2021-07-22 12:15
Modified
2024-11-21 06:03
Severity ?
Summary
SysAid 20.3.64 b14 is affected by Cross Site Scripting (XSS) via a /KeepAlive.jsp?stamp= URI.
References
▼ | URL | Tags | |
---|---|---|---|
cve@mitre.org | https://eh337.net/2021/03/30/sysaid/ | Exploit, Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://eh337.net/2021/03/30/sysaid/ | Exploit, Third Party Advisory |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:sysaid:sysaid:20.3.64:b14:*:*:*:*:*:*", "matchCriteriaId": "06922BD5-0FBB-4E29-8BDA-8DF30E11F448", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "SysAid 20.3.64 b14 is affected by Cross Site Scripting (XSS) via a /KeepAlive.jsp?stamp= URI." }, { "lang": "es", "value": "SysAid versi\u00f3n 20.3.64 b14, est\u00e1 afectado por una vulnerabilidad de tipo Cross Site Scripting (XSS) por medio de un URI /KeepAlive.jsp?stamp=" } ], "id": "CVE-2021-30049", "lastModified": "2024-11-21T06:03:15.983", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.1, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 2.7, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2021-07-22T12:15:07.897", "references": [ { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://eh337.net/2021/03/30/sysaid/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://eh337.net/2021/03/30/sysaid/" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-79" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2015-06-08 14:59
Modified
2024-11-21 02:28
Severity ?
Summary
SysAid Help Desk before 15.2 allows remote attackers to cause a denial of service (CPU and memory consumption) via a large number of nested entity references in an XML document to (1) /agententry, (2) /rdsmonitoringresponse, or (3) /androidactions, aka an XML Entity Expansion (XEE) attack.
References
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:sysaid:sysaid:*:*:*:*:*:*:*:*", "matchCriteriaId": "7733C5DB-1070-4A0E-99E9-14299634B65B", "versionEndIncluding": "15.1", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "SysAid Help Desk before 15.2 allows remote attackers to cause a denial of service (CPU and memory consumption) via a large number of nested entity references in an XML document to (1) /agententry, (2) /rdsmonitoringresponse, or (3) /androidactions, aka an XML Entity Expansion (XEE) attack." }, { "lang": "es", "value": "SysAid Help Desk anterior a 15.2 permite a atacantes remotos causar una denegaci\u00f3n de servicio (consumo de CPU y memoria) a trav\u00e9s de un n\u00famero grande de referencias de entidad anidadas en un documento XML en (1) /agententry, (2) /rdsmonitoringresponse, o (3) /androidactions, tambi\u00e9n conocido como un ataque de la expansi\u00f3n de entidad XML (XEE)." } ], "id": "CVE-2015-3000", "lastModified": "2024-11-21T02:28:28.833", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 7.8, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:C", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 6.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2015-06-08T14:59:08.460", "references": [ { "source": "cve@mitre.org", "tags": [ "Exploit" ], "url": "http://packetstormsecurity.com/files/132138/SysAid-Help-Desk-14.4-Code-Execution-Denial-Of-Service-Traversal-SQL-Injection.html" }, { "source": "cve@mitre.org", "tags": [ "Exploit" ], "url": "http://seclists.org/fulldisclosure/2015/Jun/8" }, { "source": "cve@mitre.org", "url": "http://www.securityfocus.com/archive/1/535679/100/0/threaded" }, { "source": "cve@mitre.org", "url": "http://www.securityfocus.com/bid/75038" }, { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "https://www.sysaid.com/blog/entry/sysaid-15-2-your-voice-your-service-desk" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit" ], "url": "http://packetstormsecurity.com/files/132138/SysAid-Help-Desk-14.4-Code-Execution-Denial-Of-Service-Traversal-SQL-Injection.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit" ], "url": "http://seclists.org/fulldisclosure/2015/Jun/8" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/archive/1/535679/100/0/threaded" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/bid/75038" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://www.sysaid.com/blog/entry/sysaid-15-2-your-voice-your-service-desk" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-399" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
cve-2015-2997
Vulnerability from cvelistv5
Published
2015-06-08 14:00
Modified
2024-08-06 05:32
Severity ?
EPSS score ?
Summary
SysAid Help Desk before 15.2 allows remote attackers to obtain sensitive information via an invalid value in the accountid parameter to getAgentLogFile, as demonstrated by a large directory traversal sequence, which reveals the installation path in an error message.
References
▼ | URL | Tags |
---|---|---|
http://seclists.org/fulldisclosure/2015/Jun/8 | mailing-list, x_refsource_FULLDISC | |
http://www.securityfocus.com/archive/1/535679/100/0/threaded | mailing-list, x_refsource_BUGTRAQ | |
http://packetstormsecurity.com/files/132138/SysAid-Help-Desk-14.4-Code-Execution-Denial-Of-Service-Traversal-SQL-Injection.html | x_refsource_MISC | |
http://www.securityfocus.com/bid/75038 | vdb-entry, x_refsource_BID | |
https://www.sysaid.com/blog/entry/sysaid-15-2-your-voice-your-service-desk | x_refsource_CONFIRM |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T05:32:21.195Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "20150603 [Multiple CVE\u0027s]: various critical vulnerabilities in SysAid Help Desk (RCE, file download, DoS, etc)", "tags": [ "mailing-list", "x_refsource_FULLDISC", "x_transferred" ], "url": "http://seclists.org/fulldisclosure/2015/Jun/8" }, { "name": "20150603 [Multiple CVE\u0027s]: various critical vulnerabilities in SysAid Help Desk (RCE, file download, DoS, etc)", "tags": [ "mailing-list", "x_refsource_BUGTRAQ", "x_transferred" ], "url": "http://www.securityfocus.com/archive/1/535679/100/0/threaded" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://packetstormsecurity.com/files/132138/SysAid-Help-Desk-14.4-Code-Execution-Denial-Of-Service-Traversal-SQL-Injection.html" }, { "name": "75038", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/75038" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://www.sysaid.com/blog/entry/sysaid-15-2-your-voice-your-service-desk" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2015-06-03T00:00:00", "descriptions": [ { "lang": "en", "value": "SysAid Help Desk before 15.2 allows remote attackers to obtain sensitive information via an invalid value in the accountid parameter to getAgentLogFile, as demonstrated by a large directory traversal sequence, which reveals the installation path in an error message." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2018-10-09T18:57:01", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "name": "20150603 [Multiple CVE\u0027s]: various critical vulnerabilities in SysAid Help Desk (RCE, file download, DoS, etc)", "tags": [ "mailing-list", "x_refsource_FULLDISC" ], "url": "http://seclists.org/fulldisclosure/2015/Jun/8" }, { "name": "20150603 [Multiple CVE\u0027s]: various critical vulnerabilities in SysAid Help Desk (RCE, file download, DoS, etc)", "tags": [ "mailing-list", "x_refsource_BUGTRAQ" ], "url": "http://www.securityfocus.com/archive/1/535679/100/0/threaded" }, { "tags": [ "x_refsource_MISC" ], "url": "http://packetstormsecurity.com/files/132138/SysAid-Help-Desk-14.4-Code-Execution-Denial-Of-Service-Traversal-SQL-Injection.html" }, { "name": "75038", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/75038" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://www.sysaid.com/blog/entry/sysaid-15-2-your-voice-your-service-desk" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2015-2997", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "SysAid Help Desk before 15.2 allows remote attackers to obtain sensitive information via an invalid value in the accountid parameter to getAgentLogFile, as demonstrated by a large directory traversal sequence, which reveals the installation path in an error message." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "20150603 [Multiple CVE\u0027s]: various critical vulnerabilities in SysAid Help Desk (RCE, file download, DoS, etc)", "refsource": "FULLDISC", "url": "http://seclists.org/fulldisclosure/2015/Jun/8" }, { "name": "20150603 [Multiple CVE\u0027s]: various critical vulnerabilities in SysAid Help Desk (RCE, file download, DoS, etc)", "refsource": "BUGTRAQ", "url": "http://www.securityfocus.com/archive/1/535679/100/0/threaded" }, { "name": "http://packetstormsecurity.com/files/132138/SysAid-Help-Desk-14.4-Code-Execution-Denial-Of-Service-Traversal-SQL-Injection.html", "refsource": "MISC", "url": "http://packetstormsecurity.com/files/132138/SysAid-Help-Desk-14.4-Code-Execution-Denial-Of-Service-Traversal-SQL-Injection.html" }, { "name": "75038", "refsource": "BID", "url": "http://www.securityfocus.com/bid/75038" }, { "name": "https://www.sysaid.com/blog/entry/sysaid-15-2-your-voice-your-service-desk", "refsource": "CONFIRM", "url": "https://www.sysaid.com/blog/entry/sysaid-15-2-your-voice-your-service-desk" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2015-2997", "datePublished": "2015-06-08T14:00:00", "dateReserved": "2015-04-07T00:00:00", "dateUpdated": "2024-08-06T05:32:21.195Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2015-3000
Vulnerability from cvelistv5
Published
2015-06-08 14:00
Modified
2024-08-06 05:32
Severity ?
EPSS score ?
Summary
SysAid Help Desk before 15.2 allows remote attackers to cause a denial of service (CPU and memory consumption) via a large number of nested entity references in an XML document to (1) /agententry, (2) /rdsmonitoringresponse, or (3) /androidactions, aka an XML Entity Expansion (XEE) attack.
References
▼ | URL | Tags |
---|---|---|
http://seclists.org/fulldisclosure/2015/Jun/8 | mailing-list, x_refsource_FULLDISC | |
http://www.securityfocus.com/archive/1/535679/100/0/threaded | mailing-list, x_refsource_BUGTRAQ | |
http://packetstormsecurity.com/files/132138/SysAid-Help-Desk-14.4-Code-Execution-Denial-Of-Service-Traversal-SQL-Injection.html | x_refsource_MISC | |
http://www.securityfocus.com/bid/75038 | vdb-entry, x_refsource_BID | |
https://www.sysaid.com/blog/entry/sysaid-15-2-your-voice-your-service-desk | x_refsource_CONFIRM |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T05:32:21.283Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "20150603 [Multiple CVE\u0027s]: various critical vulnerabilities in SysAid Help Desk (RCE, file download, DoS, etc)", "tags": [ "mailing-list", "x_refsource_FULLDISC", "x_transferred" ], "url": "http://seclists.org/fulldisclosure/2015/Jun/8" }, { "name": "20150603 [Multiple CVE\u0027s]: various critical vulnerabilities in SysAid Help Desk (RCE, file download, DoS, etc)", "tags": [ "mailing-list", "x_refsource_BUGTRAQ", "x_transferred" ], "url": "http://www.securityfocus.com/archive/1/535679/100/0/threaded" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://packetstormsecurity.com/files/132138/SysAid-Help-Desk-14.4-Code-Execution-Denial-Of-Service-Traversal-SQL-Injection.html" }, { "name": "75038", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/75038" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://www.sysaid.com/blog/entry/sysaid-15-2-your-voice-your-service-desk" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2015-06-03T00:00:00", "descriptions": [ { "lang": "en", "value": "SysAid Help Desk before 15.2 allows remote attackers to cause a denial of service (CPU and memory consumption) via a large number of nested entity references in an XML document to (1) /agententry, (2) /rdsmonitoringresponse, or (3) /androidactions, aka an XML Entity Expansion (XEE) attack." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2018-10-09T18:57:01", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "name": "20150603 [Multiple CVE\u0027s]: various critical vulnerabilities in SysAid Help Desk (RCE, file download, DoS, etc)", "tags": [ "mailing-list", "x_refsource_FULLDISC" ], "url": "http://seclists.org/fulldisclosure/2015/Jun/8" }, { "name": "20150603 [Multiple CVE\u0027s]: various critical vulnerabilities in SysAid Help Desk (RCE, file download, DoS, etc)", "tags": [ "mailing-list", "x_refsource_BUGTRAQ" ], "url": "http://www.securityfocus.com/archive/1/535679/100/0/threaded" }, { "tags": [ "x_refsource_MISC" ], "url": "http://packetstormsecurity.com/files/132138/SysAid-Help-Desk-14.4-Code-Execution-Denial-Of-Service-Traversal-SQL-Injection.html" }, { "name": "75038", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/75038" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://www.sysaid.com/blog/entry/sysaid-15-2-your-voice-your-service-desk" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2015-3000", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "SysAid Help Desk before 15.2 allows remote attackers to cause a denial of service (CPU and memory consumption) via a large number of nested entity references in an XML document to (1) /agententry, (2) /rdsmonitoringresponse, or (3) /androidactions, aka an XML Entity Expansion (XEE) attack." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "20150603 [Multiple CVE\u0027s]: various critical vulnerabilities in SysAid Help Desk (RCE, file download, DoS, etc)", "refsource": "FULLDISC", "url": "http://seclists.org/fulldisclosure/2015/Jun/8" }, { "name": "20150603 [Multiple CVE\u0027s]: various critical vulnerabilities in SysAid Help Desk (RCE, file download, DoS, etc)", "refsource": "BUGTRAQ", "url": "http://www.securityfocus.com/archive/1/535679/100/0/threaded" }, { "name": "http://packetstormsecurity.com/files/132138/SysAid-Help-Desk-14.4-Code-Execution-Denial-Of-Service-Traversal-SQL-Injection.html", "refsource": "MISC", "url": "http://packetstormsecurity.com/files/132138/SysAid-Help-Desk-14.4-Code-Execution-Denial-Of-Service-Traversal-SQL-Injection.html" }, { "name": "75038", "refsource": "BID", "url": "http://www.securityfocus.com/bid/75038" }, { "name": "https://www.sysaid.com/blog/entry/sysaid-15-2-your-voice-your-service-desk", "refsource": "CONFIRM", "url": "https://www.sysaid.com/blog/entry/sysaid-15-2-your-voice-your-service-desk" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2015-3000", "datePublished": "2015-06-08T14:00:00", "dateReserved": "2015-04-07T00:00:00", "dateUpdated": "2024-08-06T05:32:21.283Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-43973
Vulnerability from cvelistv5
Published
2022-01-11 19:20
Modified
2024-08-04 04:10
Severity ?
EPSS score ?
Summary
An unrestricted file upload vulnerability in /UploadPsIcon.jsp in SysAid ITIL 20.4.74 b10 allows a remote authenticated attacker to upload an arbitrary file via the file parameter in the HTTP POST body. A successful request returns the absolute, server-side filesystem path of the uploaded file.
References
▼ | URL | Tags |
---|---|---|
https://www.sysaid.com/it-service-management-software/incident-management | x_refsource_MISC | |
https://github.com/atredispartners/advisories/blob/master/ATREDIS-2021-0002.md | x_refsource_MISC | |
https://github.com/atredispartners/advisories/blob/master/ATREDIS-2022-0001.md | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T04:10:17.149Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://www.sysaid.com/it-service-management-software/incident-management" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://github.com/atredispartners/advisories/blob/master/ATREDIS-2021-0002.md" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://github.com/atredispartners/advisories/blob/master/ATREDIS-2022-0001.md" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "descriptions": [ { "lang": "en", "value": "An unrestricted file upload vulnerability in /UploadPsIcon.jsp in SysAid ITIL 20.4.74 b10 allows a remote authenticated attacker to upload an arbitrary file via the file parameter in the HTTP POST body. A successful request returns the absolute, server-side filesystem path of the uploaded file." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2022-01-11T19:20:43", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://www.sysaid.com/it-service-management-software/incident-management" }, { "tags": [ "x_refsource_MISC" ], "url": "https://github.com/atredispartners/advisories/blob/master/ATREDIS-2021-0002.md" }, { "tags": [ "x_refsource_MISC" ], "url": "https://github.com/atredispartners/advisories/blob/master/ATREDIS-2022-0001.md" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2021-43973", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "An unrestricted file upload vulnerability in /UploadPsIcon.jsp in SysAid ITIL 20.4.74 b10 allows a remote authenticated attacker to upload an arbitrary file via the file parameter in the HTTP POST body. A successful request returns the absolute, server-side filesystem path of the uploaded file." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "https://www.sysaid.com/it-service-management-software/incident-management", "refsource": "MISC", "url": "https://www.sysaid.com/it-service-management-software/incident-management" }, { "name": "https://github.com/atredispartners/advisories/blob/master/ATREDIS-2021-0002.md", "refsource": "MISC", "url": "https://github.com/atredispartners/advisories/blob/master/ATREDIS-2021-0002.md" }, { "name": "https://github.com/atredispartners/advisories/blob/master/ATREDIS-2022-0001.md", "refsource": "MISC", "url": "https://github.com/atredispartners/advisories/blob/master/ATREDIS-2022-0001.md" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2021-43973", "datePublished": "2022-01-11T19:20:43", "dateReserved": "2021-11-17T00:00:00", "dateUpdated": "2024-08-04T04:10:17.149Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2015-2998
Vulnerability from cvelistv5
Published
2015-06-08 14:00
Modified
2024-08-06 05:32
Severity ?
EPSS score ?
Summary
SysAid Help Desk before 15.2 uses a hardcoded encryption key, which makes it easier for remote attackers to obtain sensitive information, as demonstrated by decrypting the database password in WEB-INF/conf/serverConf.xml.
References
▼ | URL | Tags |
---|---|---|
http://seclists.org/fulldisclosure/2015/Jun/8 | mailing-list, x_refsource_FULLDISC | |
http://www.securityfocus.com/archive/1/535679/100/0/threaded | mailing-list, x_refsource_BUGTRAQ | |
http://www.securityfocus.com/bid/75035 | vdb-entry, x_refsource_BID | |
http://packetstormsecurity.com/files/132138/SysAid-Help-Desk-14.4-Code-Execution-Denial-Of-Service-Traversal-SQL-Injection.html | x_refsource_MISC | |
https://www.sysaid.com/blog/entry/sysaid-15-2-your-voice-your-service-desk | x_refsource_CONFIRM |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T05:32:21.290Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "20150603 [Multiple CVE\u0027s]: various critical vulnerabilities in SysAid Help Desk (RCE, file download, DoS, etc)", "tags": [ "mailing-list", "x_refsource_FULLDISC", "x_transferred" ], "url": "http://seclists.org/fulldisclosure/2015/Jun/8" }, { "name": "20150603 [Multiple CVE\u0027s]: various critical vulnerabilities in SysAid Help Desk (RCE, file download, DoS, etc)", "tags": [ "mailing-list", "x_refsource_BUGTRAQ", "x_transferred" ], "url": "http://www.securityfocus.com/archive/1/535679/100/0/threaded" }, { "name": "75035", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/75035" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://packetstormsecurity.com/files/132138/SysAid-Help-Desk-14.4-Code-Execution-Denial-Of-Service-Traversal-SQL-Injection.html" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://www.sysaid.com/blog/entry/sysaid-15-2-your-voice-your-service-desk" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2015-06-03T00:00:00", "descriptions": [ { "lang": "en", "value": "SysAid Help Desk before 15.2 uses a hardcoded encryption key, which makes it easier for remote attackers to obtain sensitive information, as demonstrated by decrypting the database password in WEB-INF/conf/serverConf.xml." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2018-10-09T18:57:01", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "name": "20150603 [Multiple CVE\u0027s]: various critical vulnerabilities in SysAid Help Desk (RCE, file download, DoS, etc)", "tags": [ "mailing-list", "x_refsource_FULLDISC" ], "url": "http://seclists.org/fulldisclosure/2015/Jun/8" }, { "name": "20150603 [Multiple CVE\u0027s]: various critical vulnerabilities in SysAid Help Desk (RCE, file download, DoS, etc)", "tags": [ "mailing-list", "x_refsource_BUGTRAQ" ], "url": "http://www.securityfocus.com/archive/1/535679/100/0/threaded" }, { "name": "75035", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/75035" }, { "tags": [ "x_refsource_MISC" ], "url": "http://packetstormsecurity.com/files/132138/SysAid-Help-Desk-14.4-Code-Execution-Denial-Of-Service-Traversal-SQL-Injection.html" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://www.sysaid.com/blog/entry/sysaid-15-2-your-voice-your-service-desk" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2015-2998", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "SysAid Help Desk before 15.2 uses a hardcoded encryption key, which makes it easier for remote attackers to obtain sensitive information, as demonstrated by decrypting the database password in WEB-INF/conf/serverConf.xml." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "20150603 [Multiple CVE\u0027s]: various critical vulnerabilities in SysAid Help Desk (RCE, file download, DoS, etc)", "refsource": "FULLDISC", "url": "http://seclists.org/fulldisclosure/2015/Jun/8" }, { "name": "20150603 [Multiple CVE\u0027s]: various critical vulnerabilities in SysAid Help Desk (RCE, file download, DoS, etc)", "refsource": "BUGTRAQ", "url": "http://www.securityfocus.com/archive/1/535679/100/0/threaded" }, { "name": "75035", "refsource": "BID", "url": "http://www.securityfocus.com/bid/75035" }, { "name": "http://packetstormsecurity.com/files/132138/SysAid-Help-Desk-14.4-Code-Execution-Denial-Of-Service-Traversal-SQL-Injection.html", "refsource": "MISC", "url": "http://packetstormsecurity.com/files/132138/SysAid-Help-Desk-14.4-Code-Execution-Denial-Of-Service-Traversal-SQL-Injection.html" }, { "name": "https://www.sysaid.com/blog/entry/sysaid-15-2-your-voice-your-service-desk", "refsource": "CONFIRM", "url": "https://www.sysaid.com/blog/entry/sysaid-15-2-your-voice-your-service-desk" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2015-2998", "datePublished": "2015-06-08T14:00:00", "dateReserved": "2015-04-07T00:00:00", "dateUpdated": "2024-08-06T05:32:21.290Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-32226
Vulnerability from cvelistv5
Published
2023-07-30 07:53
Modified
2024-10-11 14:07
Severity ?
EPSS score ?
Summary
Sysaid - CWE-552: Files or Directories Accessible to External Parties -
Authenticated users may exfiltrate files from the server via an unspecified method.
References
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T15:10:24.214Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://www.gov.il/en/Departments/faq/cve_advisories" } ], "title": "CVE Program Container" }, { "metrics": [ { "other": { "content": { "id": "CVE-2023-32226", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-10-11T13:03:26.377244Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-10-11T14:07:55.756Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "Sysaid", "vendor": "Sysaid", "versions": [ { "lessThan": "23.2.14 b18", "status": "affected", "version": "All versions", "versionType": "custom" } ] } ], "credits": [ { "lang": "en", "type": "finder", "user": "00000000-0000-4000-9000-000000000000", "value": "Niv Levy" } ], "datePublic": "2023-07-30T06:54:00.000Z", "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": " Sysaid - CWE-552: Files or Directories Accessible to External Parties -\u0026nbsp;\n\n\u003cspan style=\"background-color: rgb(255, 255, 255);\"\u003eAuthenticated users may exfiltrate files from the server via an unspecified method.\u003c/span\u003e\n\n" } ], "value": " Sysaid - CWE-552: Files or Directories Accessible to External Parties -\u00a0\n\nAuthenticated users may exfiltrate files from the server via an unspecified method.\n\n" } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.3, "baseSeverity": "HIGH", "confidentialityImpact": "LOW", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:H/A:H", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-552", "description": "CWE-552 Files or Directories Accessible to External Parties", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2023-07-30T07:53:21.574Z", "orgId": "a57ee1ae-c9c1-4f40-aa7b-cf10760fde3f", "shortName": "INCD" }, "references": [ { "url": "https://www.gov.il/en/Departments/faq/cve_advisories" } ], "solutions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "\n\n\u003cspan style=\"background-color: rgb(255, 255, 255);\"\u003eUpdate to version 23.2.14 b18 (On-Prem). \u003c/span\u003e\n\n\u003cbr\u003e" } ], "value": "\nUpdate to version 23.2.14 b18 (On-Prem). \n\n\n" } ], "source": { "advisory": "ILVN-2023-0113", "discovery": "UNKNOWN" }, "title": " Sysaid - CWE-552: Files or Directories Accessible to External Parties", "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "a57ee1ae-c9c1-4f40-aa7b-cf10760fde3f", "assignerShortName": "INCD", "cveId": "CVE-2023-32226", "datePublished": "2023-07-30T07:53:21.574Z", "dateReserved": "2023-05-04T20:53:11.224Z", "dateUpdated": "2024-10-11T14:07:55.756Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2015-2999
Vulnerability from cvelistv5
Published
2015-06-08 14:00
Modified
2024-08-06 05:32
Severity ?
EPSS score ?
Summary
Multiple SQL injection vulnerabilities in SysAid Help Desk before 15.2 allow remote administrators to execute arbitrary SQL commands via the (1) groupFilter parameter in an AssetDetails report to /genericreport, customSQL parameter in a (2) TopAdministratorsByAverageTimer report or an (3) ActiveRequests report to /genericreport, (4) dir parameter to HelpDesk.jsp, or (5) grantSQL parameter to RFCGantt.jsp.
References
▼ | URL | Tags |
---|---|---|
http://seclists.org/fulldisclosure/2015/Jun/8 | mailing-list, x_refsource_FULLDISC | |
http://www.securityfocus.com/archive/1/535679/100/0/threaded | mailing-list, x_refsource_BUGTRAQ | |
http://packetstormsecurity.com/files/132138/SysAid-Help-Desk-14.4-Code-Execution-Denial-Of-Service-Traversal-SQL-Injection.html | x_refsource_MISC | |
http://www.securityfocus.com/bid/75038 | vdb-entry, x_refsource_BID | |
https://www.sysaid.com/blog/entry/sysaid-15-2-your-voice-your-service-desk | x_refsource_CONFIRM |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T05:32:21.287Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "20150603 [Multiple CVE\u0027s]: various critical vulnerabilities in SysAid Help Desk (RCE, file download, DoS, etc)", "tags": [ "mailing-list", "x_refsource_FULLDISC", "x_transferred" ], "url": "http://seclists.org/fulldisclosure/2015/Jun/8" }, { "name": "20150603 [Multiple CVE\u0027s]: various critical vulnerabilities in SysAid Help Desk (RCE, file download, DoS, etc)", "tags": [ "mailing-list", "x_refsource_BUGTRAQ", "x_transferred" ], "url": "http://www.securityfocus.com/archive/1/535679/100/0/threaded" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://packetstormsecurity.com/files/132138/SysAid-Help-Desk-14.4-Code-Execution-Denial-Of-Service-Traversal-SQL-Injection.html" }, { "name": "75038", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/75038" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://www.sysaid.com/blog/entry/sysaid-15-2-your-voice-your-service-desk" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2015-06-03T00:00:00", "descriptions": [ { "lang": "en", "value": "Multiple SQL injection vulnerabilities in SysAid Help Desk before 15.2 allow remote administrators to execute arbitrary SQL commands via the (1) groupFilter parameter in an AssetDetails report to /genericreport, customSQL parameter in a (2) TopAdministratorsByAverageTimer report or an (3) ActiveRequests report to /genericreport, (4) dir parameter to HelpDesk.jsp, or (5) grantSQL parameter to RFCGantt.jsp." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2018-10-09T18:57:01", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "name": "20150603 [Multiple CVE\u0027s]: various critical vulnerabilities in SysAid Help Desk (RCE, file download, DoS, etc)", "tags": [ "mailing-list", "x_refsource_FULLDISC" ], "url": "http://seclists.org/fulldisclosure/2015/Jun/8" }, { "name": "20150603 [Multiple CVE\u0027s]: various critical vulnerabilities in SysAid Help Desk (RCE, file download, DoS, etc)", "tags": [ "mailing-list", "x_refsource_BUGTRAQ" ], "url": "http://www.securityfocus.com/archive/1/535679/100/0/threaded" }, { "tags": [ "x_refsource_MISC" ], "url": "http://packetstormsecurity.com/files/132138/SysAid-Help-Desk-14.4-Code-Execution-Denial-Of-Service-Traversal-SQL-Injection.html" }, { "name": "75038", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/75038" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://www.sysaid.com/blog/entry/sysaid-15-2-your-voice-your-service-desk" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2015-2999", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Multiple SQL injection vulnerabilities in SysAid Help Desk before 15.2 allow remote administrators to execute arbitrary SQL commands via the (1) groupFilter parameter in an AssetDetails report to /genericreport, customSQL parameter in a (2) TopAdministratorsByAverageTimer report or an (3) ActiveRequests report to /genericreport, (4) dir parameter to HelpDesk.jsp, or (5) grantSQL parameter to RFCGantt.jsp." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "20150603 [Multiple CVE\u0027s]: various critical vulnerabilities in SysAid Help Desk (RCE, file download, DoS, etc)", "refsource": "FULLDISC", "url": "http://seclists.org/fulldisclosure/2015/Jun/8" }, { "name": "20150603 [Multiple CVE\u0027s]: various critical vulnerabilities in SysAid Help Desk (RCE, file download, DoS, etc)", "refsource": "BUGTRAQ", "url": "http://www.securityfocus.com/archive/1/535679/100/0/threaded" }, { "name": "http://packetstormsecurity.com/files/132138/SysAid-Help-Desk-14.4-Code-Execution-Denial-Of-Service-Traversal-SQL-Injection.html", "refsource": "MISC", "url": "http://packetstormsecurity.com/files/132138/SysAid-Help-Desk-14.4-Code-Execution-Denial-Of-Service-Traversal-SQL-Injection.html" }, { "name": "75038", "refsource": "BID", "url": "http://www.securityfocus.com/bid/75038" }, { "name": "https://www.sysaid.com/blog/entry/sysaid-15-2-your-voice-your-service-desk", "refsource": "CONFIRM", "url": "https://www.sysaid.com/blog/entry/sysaid-15-2-your-voice-your-service-desk" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2015-2999", "datePublished": "2015-06-08T14:00:00", "dateReserved": "2015-04-07T00:00:00", "dateUpdated": "2024-08-06T05:32:21.287Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-47246
Vulnerability from cvelistv5
Published
2023-11-10 00:00
Modified
2024-08-02 21:09
Severity ?
EPSS score ?
Summary
In SysAid On-Premise before 23.3.36, a path traversal vulnerability leads to code execution after an attacker writes a file to the Tomcat webroot, as exploited in the wild in November 2023.
References
{ "containers": { "adp": [ { "affected": [ { "cpes": [ "cpe:2.3:a:sysaid:sysaid_on-premises:*:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "sysaid_on-premises", "vendor": "sysaid", "versions": [ { "lessThan": "23.3.36", "status": "affected", "version": "0", "versionType": "custom" } ] } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" } }, { "other": { "content": { "id": "CVE-2023-47246", "options": [ { "Exploitation": "active" }, { "Automatable": "yes" }, { "Technical Impact": "total" } ], "role": "CISA Coordinator", "timestamp": "2024-04-06T04:00:38.286026Z", "version": "2.0.3" }, "type": "ssvc" } }, { "other": { "content": { "dateAdded": "2023-11-13", "reference": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog?search_api_fulltext=CVE-2023-47246" }, "type": "kev" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-22", "description": "CWE-22 Improper Limitation of a Pathname to a Restricted Directory (\u0027Path Traversal\u0027)", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-07-06T13:52:50.136Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" }, { "providerMetadata": { "dateUpdated": "2024-08-02T21:09:36.042Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://documentation.sysaid.com/docs/on-premise-security-enhancements-2023" }, { "tags": [ "x_transferred" ], "url": "https://www.sysaid.com/blog/service-desk/on-premise-software-security-vulnerability-notification" }, { "tags": [ "x_transferred" ], "url": "https://documentation.sysaid.com/docs/latest-version-installation-files" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "descriptions": [ { "lang": "en", "value": "In SysAid On-Premise before 23.3.36, a path traversal vulnerability leads to code execution after an attacker writes a file to the Tomcat webroot, as exploited in the wild in November 2023." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2023-11-10T05:42:44.754806", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "url": "https://documentation.sysaid.com/docs/on-premise-security-enhancements-2023" }, { "url": "https://www.sysaid.com/blog/service-desk/on-premise-software-security-vulnerability-notification" }, { "url": "https://documentation.sysaid.com/docs/latest-version-installation-files" } ] } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2023-47246", "datePublished": "2023-11-10T00:00:00", "dateReserved": "2023-11-04T00:00:00", "dateUpdated": "2024-08-02T21:09:36.042Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-30049
Vulnerability from cvelistv5
Published
2021-07-22 11:54
Modified
2024-08-03 22:24
Severity ?
EPSS score ?
Summary
SysAid 20.3.64 b14 is affected by Cross Site Scripting (XSS) via a /KeepAlive.jsp?stamp= URI.
References
▼ | URL | Tags |
---|---|---|
https://eh337.net/2021/03/30/sysaid/ | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T22:24:59.103Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://eh337.net/2021/03/30/sysaid/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "descriptions": [ { "lang": "en", "value": "SysAid 20.3.64 b14 is affected by Cross Site Scripting (XSS) via a /KeepAlive.jsp?stamp= URI." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2021-07-22T11:54:48", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://eh337.net/2021/03/30/sysaid/" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2021-30049", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "SysAid 20.3.64 b14 is affected by Cross Site Scripting (XSS) via a /KeepAlive.jsp?stamp= URI." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "https://eh337.net/2021/03/30/sysaid/", "refsource": "MISC", "url": "https://eh337.net/2021/03/30/sysaid/" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2021-30049", "datePublished": "2021-07-22T11:54:48", "dateReserved": "2021-04-02T00:00:00", "dateUpdated": "2024-08-03T22:24:59.103Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-33706
Vulnerability from cvelistv5
Published
2023-11-24 00:00
Modified
2024-08-02 15:47
Severity ?
EPSS score ?
Summary
SysAid before 23.2.15 allows Indirect Object Reference (IDOR) attacks to read ticket data via a modified sid parameter to EmailHtmlSourceIframe.jsp or a modified srID parameter to ShowMessage.jsp.
References
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T15:47:06.535Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://blog.pridesec.com.br/en/insecure-direct-object-reference-idor-affects-helpdesk-sysaid/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "descriptions": [ { "lang": "en", "value": "SysAid before 23.2.15 allows Indirect Object Reference (IDOR) attacks to read ticket data via a modified sid parameter to EmailHtmlSourceIframe.jsp or a modified srID parameter to ShowMessage.jsp." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2023-11-24T01:55:29.801050", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "url": "https://blog.pridesec.com.br/en/insecure-direct-object-reference-idor-affects-helpdesk-sysaid/" } ] } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2023-33706", "datePublished": "2023-11-24T00:00:00", "dateReserved": "2023-05-22T00:00:00", "dateUpdated": "2024-08-02T15:47:06.535Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-47247
Vulnerability from cvelistv5
Published
2023-12-25 00:00
Modified
2024-08-02 21:09
Severity ?
EPSS score ?
Summary
In SysAid On-Premise before 23.3.34, there is an edge case in which an end user is able to delete a Knowledge Base article, aka bug 15102.
References
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T21:09:35.903Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://documentation.sysaid.com/docs/23334" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "descriptions": [ { "lang": "en", "value": "In SysAid On-Premise before 23.3.34, there is an edge case in which an end user is able to delete a Knowledge Base article, aka bug 15102." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2023-12-25T06:19:10.695118", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "url": "https://documentation.sysaid.com/docs/23334" } ] } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2023-47247", "datePublished": "2023-12-25T00:00:00", "dateReserved": "2023-11-04T00:00:00", "dateUpdated": "2024-08-02T21:09:35.903Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-31862
Vulnerability from cvelistv5
Published
2021-10-29 10:44
Modified
2024-08-03 23:10
Severity ?
EPSS score ?
Summary
SysAid 20.4.74 allows XSS via the KeepAlive.jsp stamp parameter without any authentication.
References
▼ | URL | Tags |
---|---|---|
https://www.sysaid.com/product/on-premise/latest-release | x_refsource_MISC | |
https://github.com/RobertDra/CVE-2021-31862/blob/main/README.md | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T23:10:30.768Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://www.sysaid.com/product/on-premise/latest-release" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://github.com/RobertDra/CVE-2021-31862/blob/main/README.md" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "descriptions": [ { "lang": "en", "value": "SysAid 20.4.74 allows XSS via the KeepAlive.jsp stamp parameter without any authentication." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2021-10-29T10:44:30", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://www.sysaid.com/product/on-premise/latest-release" }, { "tags": [ "x_refsource_MISC" ], "url": "https://github.com/RobertDra/CVE-2021-31862/blob/main/README.md" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2021-31862", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "SysAid 20.4.74 allows XSS via the KeepAlive.jsp stamp parameter without any authentication." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "https://www.sysaid.com/product/on-premise/latest-release", "refsource": "MISC", "url": "https://www.sysaid.com/product/on-premise/latest-release" }, { "name": "https://github.com/RobertDra/CVE-2021-31862/blob/main/README.md", "refsource": "MISC", "url": "https://github.com/RobertDra/CVE-2021-31862/blob/main/README.md" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2021-31862", "datePublished": "2021-10-29T10:44:30", "dateReserved": "2021-04-28T00:00:00", "dateUpdated": "2024-08-03T23:10:30.768Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-32225
Vulnerability from cvelistv5
Published
2023-07-30 07:16
Modified
2024-10-21 17:53
Severity ?
EPSS score ?
Summary
Sysaid - CWE-434: Unrestricted Upload of File with Dangerous Type -
A malicious user with administrative privileges may be able to upload a dangerous filetype via an unspecified method.
References
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T15:10:23.902Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://www.gov.il/en/Departments/faq/cve_advisories" } ], "title": "CVE Program Container" }, { "metrics": [ { "other": { "content": { "id": "CVE-2023-32225", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-10-21T17:53:01.794733Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-10-21T17:53:17.063Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "Sysaid", "vendor": "Sysaid", "versions": [ { "lessThan": "23.2.14 b18", "status": "affected", "version": "All versions", "versionType": "custom" } ] } ], "credits": [ { "lang": "en", "type": "finder", "user": "00000000-0000-4000-9000-000000000000", "value": "Niv Levy" } ], "datePublic": "2023-07-30T06:54:00.000Z", "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": " Sysaid - CWE-434: Unrestricted Upload of File with Dangerous Type -\u0026nbsp;\n\n\u003cspan style=\"background-color: rgb(255, 255, 255);\"\u003eA malicious user with administrative privileges may be able to upload a dangerous filetype via an unspecified method.\u003c/span\u003e\n\n" } ], "value": " Sysaid - CWE-434: Unrestricted Upload of File with Dangerous Type -\u00a0\n\nA malicious user with administrative privileges may be able to upload a dangerous filetype via an unspecified method.\n\n" } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-434", "description": "CWE-434 Unrestricted Upload of File with Dangerous Type", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2023-07-30T07:16:24.730Z", "orgId": "a57ee1ae-c9c1-4f40-aa7b-cf10760fde3f", "shortName": "INCD" }, "references": [ { "url": "https://www.gov.il/en/Departments/faq/cve_advisories" } ], "solutions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "\n\n\u003cspan style=\"background-color: rgb(255, 255, 255);\"\u003eUpdate to version 23.2.14 b18 (On-Prem). \u003c/span\u003e\n\n\u003cbr\u003e" } ], "value": "\nUpdate to version 23.2.14 b18 (On-Prem). \n\n\n" } ], "source": { "advisory": "ILVN-2023-0112", "discovery": "UNKNOWN" }, "title": " Sysaid - CWE-434: Unrestricted Upload of File with Dangerous Type", "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "a57ee1ae-c9c1-4f40-aa7b-cf10760fde3f", "assignerShortName": "INCD", "cveId": "CVE-2023-32225", "datePublished": "2023-07-30T07:16:24.730Z", "dateReserved": "2023-05-04T20:53:11.224Z", "dateUpdated": "2024-10-21T17:53:17.063Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2015-2993
Vulnerability from cvelistv5
Published
2015-06-08 14:00
Modified
2024-08-06 05:32
Severity ?
EPSS score ?
Summary
SysAid Help Desk before 15.2 does not properly restrict access to certain functionality, which allows remote attackers to (1) create administrator accounts via a crafted request to /createnewaccount or (2) write to arbitrary files via the fileName parameter to /userentry.
References
▼ | URL | Tags |
---|---|---|
http://seclists.org/fulldisclosure/2015/Jun/8 | mailing-list, x_refsource_FULLDISC | |
http://www.securityfocus.com/archive/1/535679/100/0/threaded | mailing-list, x_refsource_BUGTRAQ | |
http://packetstormsecurity.com/files/132138/SysAid-Help-Desk-14.4-Code-Execution-Denial-Of-Service-Traversal-SQL-Injection.html | x_refsource_MISC | |
http://www.securityfocus.com/bid/75038 | vdb-entry, x_refsource_BID | |
https://www.sysaid.com/blog/entry/sysaid-15-2-your-voice-your-service-desk | x_refsource_CONFIRM |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T05:32:21.357Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "20150603 [Multiple CVE\u0027s]: various critical vulnerabilities in SysAid Help Desk (RCE, file download, DoS, etc)", "tags": [ "mailing-list", "x_refsource_FULLDISC", "x_transferred" ], "url": "http://seclists.org/fulldisclosure/2015/Jun/8" }, { "name": "20150603 [Multiple CVE\u0027s]: various critical vulnerabilities in SysAid Help Desk (RCE, file download, DoS, etc)", "tags": [ "mailing-list", "x_refsource_BUGTRAQ", "x_transferred" ], "url": "http://www.securityfocus.com/archive/1/535679/100/0/threaded" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://packetstormsecurity.com/files/132138/SysAid-Help-Desk-14.4-Code-Execution-Denial-Of-Service-Traversal-SQL-Injection.html" }, { "name": "75038", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/75038" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://www.sysaid.com/blog/entry/sysaid-15-2-your-voice-your-service-desk" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2015-06-03T00:00:00", "descriptions": [ { "lang": "en", "value": "SysAid Help Desk before 15.2 does not properly restrict access to certain functionality, which allows remote attackers to (1) create administrator accounts via a crafted request to /createnewaccount or (2) write to arbitrary files via the fileName parameter to /userentry." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2018-10-09T18:57:01", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "name": "20150603 [Multiple CVE\u0027s]: various critical vulnerabilities in SysAid Help Desk (RCE, file download, DoS, etc)", "tags": [ "mailing-list", "x_refsource_FULLDISC" ], "url": "http://seclists.org/fulldisclosure/2015/Jun/8" }, { "name": "20150603 [Multiple CVE\u0027s]: various critical vulnerabilities in SysAid Help Desk (RCE, file download, DoS, etc)", "tags": [ "mailing-list", "x_refsource_BUGTRAQ" ], "url": "http://www.securityfocus.com/archive/1/535679/100/0/threaded" }, { "tags": [ "x_refsource_MISC" ], "url": "http://packetstormsecurity.com/files/132138/SysAid-Help-Desk-14.4-Code-Execution-Denial-Of-Service-Traversal-SQL-Injection.html" }, { "name": "75038", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/75038" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://www.sysaid.com/blog/entry/sysaid-15-2-your-voice-your-service-desk" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2015-2993", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "SysAid Help Desk before 15.2 does not properly restrict access to certain functionality, which allows remote attackers to (1) create administrator accounts via a crafted request to /createnewaccount or (2) write to arbitrary files via the fileName parameter to /userentry." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "20150603 [Multiple CVE\u0027s]: various critical vulnerabilities in SysAid Help Desk (RCE, file download, DoS, etc)", "refsource": "FULLDISC", "url": "http://seclists.org/fulldisclosure/2015/Jun/8" }, { "name": "20150603 [Multiple CVE\u0027s]: various critical vulnerabilities in SysAid Help Desk (RCE, file download, DoS, etc)", "refsource": "BUGTRAQ", "url": "http://www.securityfocus.com/archive/1/535679/100/0/threaded" }, { "name": "http://packetstormsecurity.com/files/132138/SysAid-Help-Desk-14.4-Code-Execution-Denial-Of-Service-Traversal-SQL-Injection.html", "refsource": "MISC", "url": "http://packetstormsecurity.com/files/132138/SysAid-Help-Desk-14.4-Code-Execution-Denial-Of-Service-Traversal-SQL-Injection.html" }, { "name": "75038", "refsource": "BID", "url": "http://www.securityfocus.com/bid/75038" }, { "name": "https://www.sysaid.com/blog/entry/sysaid-15-2-your-voice-your-service-desk", "refsource": "CONFIRM", "url": "https://www.sysaid.com/blog/entry/sysaid-15-2-your-voice-your-service-desk" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2015-2993", "datePublished": "2015-06-08T14:00:00", "dateReserved": "2015-04-07T00:00:00", "dateUpdated": "2024-08-06T05:32:21.357Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2022-23165
Vulnerability from cvelistv5
Published
2022-05-12 19:49
Modified
2024-09-16 17:59
Severity ?
EPSS score ?
Summary
Sysaid – Sysaid 14.2.0 Reflected Cross-Site Scripting (XSS) - The parameter "helpPageName" used by the page "/help/treecontent.jsp" suffers from a Reflected Cross-Site Scripting vulnerability. For an attacker to exploit this Cross-Site Scripting vulnerability, it's necessary for the affected product to expose the Offline Help Pages. An attacker may gain access to sensitive information or execute client-side code in the browser session of the victim user. Furthermore, an attacker would require the victim to open a malicious link. An attacker may exploit this vulnerability in order to perform phishing attacks. The attacker can receive sensitive data like server details, usernames, workstations, etc. He can also perform actions such as uploading files, deleting calls from the system
References
▼ | URL | Tags |
---|---|---|
https://www.gov.il/en/departments/faq/cve_advisories | x_refsource_MISC |
Impacted products
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T03:36:20.055Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://www.gov.il/en/departments/faq/cve_advisories" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "platforms": [ "cloud" ], "product": "Sysaid", "vendor": "SysAid", "versions": [ { "lessThanOrEqual": "22.2.19", "status": "affected", "version": "22.2.19 cloud version", "versionType": "custom" } ] }, { "platforms": [ "on premise" ], "product": "Sysaid", "vendor": "SysAid", "versions": [ { "lessThanOrEqual": "22.1.63", "status": "affected", "version": "22.1.63 on premise version", "versionType": "custom" } ] } ], "credits": [ { "lang": "en", "value": "Robert Catalin Raducioiu,, Francesco Di Castri" } ], "datePublic": "2022-05-09T00:00:00", "descriptions": [ { "lang": "en", "value": "Sysaid \u2013 Sysaid 14.2.0 Reflected Cross-Site Scripting (XSS) - The parameter \"helpPageName\" used by the page \"/help/treecontent.jsp\" suffers from a Reflected Cross-Site Scripting vulnerability. For an attacker to exploit this Cross-Site Scripting vulnerability, it\u0027s necessary for the affected product to expose the Offline Help Pages. An attacker may gain access to sensitive information or execute client-side code in the browser session of the victim user. Furthermore, an attacker would require the victim to open a malicious link. An attacker may exploit this vulnerability in order to perform phishing attacks. The attacker can receive sensitive data like server details, usernames, workstations, etc. He can also perform actions such as uploading files, deleting calls from the system" } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "HIGH", "attackVector": "LOCAL", "availabilityImpact": "LOW", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "LOW", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:L/A:L", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-79", "description": "CWE-79 Cross-site Scripting (XSS)", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2022-05-12T19:49:18", "orgId": "a57ee1ae-c9c1-4f40-aa7b-cf10760fde3f", "shortName": "INCD" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://www.gov.il/en/departments/faq/cve_advisories" } ], "solutions": [ { "lang": "en", "value": "Update to 22.2.20 cloud version, or to 22.1.64 on premise version." } ], "source": { "defect": [ "ILVN-2022-0020" ], "discovery": "EXTERNAL" }, "title": "Sysaid \u2013 Sysaid 14.2.0 Reflected Cross-Site Scripting (XSS)", "x_generator": { "engine": "Vulnogram 0.0.9" }, "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cna@cyber.gov.il", "DATE_PUBLIC": "2022-05-09T11:39:00.000Z", "ID": "CVE-2022-23165", "STATE": "PUBLIC", "TITLE": "Sysaid \u2013 Sysaid 14.2.0 Reflected Cross-Site Scripting (XSS)" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Sysaid", "version": { "version_data": [ { "platform": "cloud", "version_affected": "\u003c=", "version_name": "22.2.19 cloud version", "version_value": "22.2.19" }, { "platform": "on premise", "version_affected": "\u003c=", "version_name": "22.1.63 on premise version", "version_value": "22.1.63" } ] } } ] }, "vendor_name": "SysAid" } ] } }, "credit": [ { "lang": "eng", "value": "Robert Catalin Raducioiu,, Francesco Di Castri" } ], "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Sysaid \u2013 Sysaid 14.2.0 Reflected Cross-Site Scripting (XSS) - The parameter \"helpPageName\" used by the page \"/help/treecontent.jsp\" suffers from a Reflected Cross-Site Scripting vulnerability. For an attacker to exploit this Cross-Site Scripting vulnerability, it\u0027s necessary for the affected product to expose the Offline Help Pages. An attacker may gain access to sensitive information or execute client-side code in the browser session of the victim user. Furthermore, an attacker would require the victim to open a malicious link. An attacker may exploit this vulnerability in order to perform phishing attacks. The attacker can receive sensitive data like server details, usernames, workstations, etc. He can also perform actions such as uploading files, deleting calls from the system" } ] }, "generator": { "engine": "Vulnogram 0.0.9" }, "impact": { "cvss": { "attackComplexity": "HIGH", "attackVector": "LOCAL", "availabilityImpact": "LOW", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "LOW", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:L/A:L", "version": "3.1" } }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-79 Cross-site Scripting (XSS)" } ] } ] }, "references": { "reference_data": [ { "name": "https://www.gov.il/en/departments/faq/cve_advisories", "refsource": "MISC", "url": "https://www.gov.il/en/departments/faq/cve_advisories" } ] }, "solution": [ { "lang": "en", "value": "Update to 22.2.20 cloud version, or to 22.1.64 on premise version." } ], "source": { "defect": [ "ILVN-2022-0020" ], "discovery": "EXTERNAL" } } } }, "cveMetadata": { "assignerOrgId": "a57ee1ae-c9c1-4f40-aa7b-cf10760fde3f", "assignerShortName": "INCD", "cveId": "CVE-2022-23165", "datePublished": "2022-05-12T19:49:18.469085Z", "dateReserved": "2022-01-11T00:00:00", "dateUpdated": "2024-09-16T17:59:45.128Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2015-3001
Vulnerability from cvelistv5
Published
2015-06-08 14:00
Modified
2024-08-06 05:32
Severity ?
EPSS score ?
Summary
SysAid Help Desk before 15.2 uses a hardcoded password of Password1 for the sa SQL Server Express user account, which allows remote authenticated users to bypass intended access restrictions by leveraging knowledge of this password.
References
▼ | URL | Tags |
---|---|---|
http://seclists.org/fulldisclosure/2015/Jun/8 | mailing-list, x_refsource_FULLDISC | |
http://www.securityfocus.com/archive/1/535679/100/0/threaded | mailing-list, x_refsource_BUGTRAQ | |
http://www.securityfocus.com/bid/75035 | vdb-entry, x_refsource_BID | |
http://packetstormsecurity.com/files/132138/SysAid-Help-Desk-14.4-Code-Execution-Denial-Of-Service-Traversal-SQL-Injection.html | x_refsource_MISC | |
https://www.sysaid.com/blog/entry/sysaid-15-2-your-voice-your-service-desk | x_refsource_CONFIRM |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T05:32:21.172Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "20150603 [Multiple CVE\u0027s]: various critical vulnerabilities in SysAid Help Desk (RCE, file download, DoS, etc)", "tags": [ "mailing-list", "x_refsource_FULLDISC", "x_transferred" ], "url": "http://seclists.org/fulldisclosure/2015/Jun/8" }, { "name": "20150603 [Multiple CVE\u0027s]: various critical vulnerabilities in SysAid Help Desk (RCE, file download, DoS, etc)", "tags": [ "mailing-list", "x_refsource_BUGTRAQ", "x_transferred" ], "url": "http://www.securityfocus.com/archive/1/535679/100/0/threaded" }, { "name": "75035", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/75035" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://packetstormsecurity.com/files/132138/SysAid-Help-Desk-14.4-Code-Execution-Denial-Of-Service-Traversal-SQL-Injection.html" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://www.sysaid.com/blog/entry/sysaid-15-2-your-voice-your-service-desk" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2015-06-03T00:00:00", "descriptions": [ { "lang": "en", "value": "SysAid Help Desk before 15.2 uses a hardcoded password of Password1 for the sa SQL Server Express user account, which allows remote authenticated users to bypass intended access restrictions by leveraging knowledge of this password." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2018-10-09T18:57:01", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "name": "20150603 [Multiple CVE\u0027s]: various critical vulnerabilities in SysAid Help Desk (RCE, file download, DoS, etc)", "tags": [ "mailing-list", "x_refsource_FULLDISC" ], "url": "http://seclists.org/fulldisclosure/2015/Jun/8" }, { "name": "20150603 [Multiple CVE\u0027s]: various critical vulnerabilities in SysAid Help Desk (RCE, file download, DoS, etc)", "tags": [ "mailing-list", "x_refsource_BUGTRAQ" ], "url": "http://www.securityfocus.com/archive/1/535679/100/0/threaded" }, { "name": "75035", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/75035" }, { "tags": [ "x_refsource_MISC" ], "url": "http://packetstormsecurity.com/files/132138/SysAid-Help-Desk-14.4-Code-Execution-Denial-Of-Service-Traversal-SQL-Injection.html" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://www.sysaid.com/blog/entry/sysaid-15-2-your-voice-your-service-desk" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2015-3001", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "SysAid Help Desk before 15.2 uses a hardcoded password of Password1 for the sa SQL Server Express user account, which allows remote authenticated users to bypass intended access restrictions by leveraging knowledge of this password." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "20150603 [Multiple CVE\u0027s]: various critical vulnerabilities in SysAid Help Desk (RCE, file download, DoS, etc)", "refsource": "FULLDISC", "url": "http://seclists.org/fulldisclosure/2015/Jun/8" }, { "name": "20150603 [Multiple CVE\u0027s]: various critical vulnerabilities in SysAid Help Desk (RCE, file download, DoS, etc)", "refsource": "BUGTRAQ", "url": "http://www.securityfocus.com/archive/1/535679/100/0/threaded" }, { "name": "75035", "refsource": "BID", "url": "http://www.securityfocus.com/bid/75035" }, { "name": "http://packetstormsecurity.com/files/132138/SysAid-Help-Desk-14.4-Code-Execution-Denial-Of-Service-Traversal-SQL-Injection.html", "refsource": "MISC", "url": "http://packetstormsecurity.com/files/132138/SysAid-Help-Desk-14.4-Code-Execution-Denial-Of-Service-Traversal-SQL-Injection.html" }, { "name": "https://www.sysaid.com/blog/entry/sysaid-15-2-your-voice-your-service-desk", "refsource": "CONFIRM", "url": "https://www.sysaid.com/blog/entry/sysaid-15-2-your-voice-your-service-desk" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2015-3001", "datePublished": "2015-06-08T14:00:00", "dateReserved": "2015-04-07T00:00:00", "dateUpdated": "2024-08-06T05:32:21.172Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-43972
Vulnerability from cvelistv5
Published
2022-01-11 19:19
Modified
2024-08-04 04:10
Severity ?
EPSS score ?
Summary
An unrestricted file copy vulnerability in /UserSelfServiceSettings.jsp in SysAid ITIL 20.4.74 b10 allows a remote authenticated attacker to copy arbitrary files on the server filesystem to the web root (with an arbitrary filename) via the tempFile and fileName parameters in the HTTP POST body.
References
▼ | URL | Tags |
---|---|---|
https://www.sysaid.com/it-service-management-software/incident-management | x_refsource_MISC | |
https://github.com/atredispartners/advisories/blob/master/ATREDIS-2021-0002.md | x_refsource_MISC | |
https://github.com/atredispartners/advisories/blob/master/ATREDIS-2022-0001.md | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T04:10:17.159Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://www.sysaid.com/it-service-management-software/incident-management" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://github.com/atredispartners/advisories/blob/master/ATREDIS-2021-0002.md" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://github.com/atredispartners/advisories/blob/master/ATREDIS-2022-0001.md" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "descriptions": [ { "lang": "en", "value": "An unrestricted file copy vulnerability in /UserSelfServiceSettings.jsp in SysAid ITIL 20.4.74 b10 allows a remote authenticated attacker to copy arbitrary files on the server filesystem to the web root (with an arbitrary filename) via the tempFile and fileName parameters in the HTTP POST body." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2022-01-11T19:19:23", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://www.sysaid.com/it-service-management-software/incident-management" }, { "tags": [ "x_refsource_MISC" ], "url": "https://github.com/atredispartners/advisories/blob/master/ATREDIS-2021-0002.md" }, { "tags": [ "x_refsource_MISC" ], "url": "https://github.com/atredispartners/advisories/blob/master/ATREDIS-2022-0001.md" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2021-43972", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "An unrestricted file copy vulnerability in /UserSelfServiceSettings.jsp in SysAid ITIL 20.4.74 b10 allows a remote authenticated attacker to copy arbitrary files on the server filesystem to the web root (with an arbitrary filename) via the tempFile and fileName parameters in the HTTP POST body." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "https://www.sysaid.com/it-service-management-software/incident-management", "refsource": "MISC", "url": "https://www.sysaid.com/it-service-management-software/incident-management" }, { "name": "https://github.com/atredispartners/advisories/blob/master/ATREDIS-2021-0002.md", "refsource": "MISC", "url": "https://github.com/atredispartners/advisories/blob/master/ATREDIS-2021-0002.md" }, { "name": "https://github.com/atredispartners/advisories/blob/master/ATREDIS-2022-0001.md", "refsource": "MISC", "url": "https://github.com/atredispartners/advisories/blob/master/ATREDIS-2022-0001.md" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2021-43972", "datePublished": "2022-01-11T19:19:23", "dateReserved": "2021-11-17T00:00:00", "dateUpdated": "2024-08-04T04:10:17.159Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2015-2994
Vulnerability from cvelistv5
Published
2015-06-08 14:00
Modified
2024-08-06 05:32
Severity ?
EPSS score ?
Summary
Unrestricted file upload vulnerability in ChangePhoto.jsp in SysAid Help Desk before 15.2 allows remote administrators to execute arbitrary code by uploading a file with a .jsp extension, then accessing it via a direct request to the file in icons/user_photo/.
References
▼ | URL | Tags |
---|---|---|
http://seclists.org/fulldisclosure/2015/Jun/8 | mailing-list, x_refsource_FULLDISC | |
http://www.securityfocus.com/archive/1/535679/100/0/threaded | mailing-list, x_refsource_BUGTRAQ | |
http://packetstormsecurity.com/files/132138/SysAid-Help-Desk-14.4-Code-Execution-Denial-Of-Service-Traversal-SQL-Injection.html | x_refsource_MISC | |
http://www.securityfocus.com/bid/75038 | vdb-entry, x_refsource_BID | |
https://www.sysaid.com/blog/entry/sysaid-15-2-your-voice-your-service-desk | x_refsource_CONFIRM |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T05:32:21.121Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "20150603 [Multiple CVE\u0027s]: various critical vulnerabilities in SysAid Help Desk (RCE, file download, DoS, etc)", "tags": [ "mailing-list", "x_refsource_FULLDISC", "x_transferred" ], "url": "http://seclists.org/fulldisclosure/2015/Jun/8" }, { "name": "20150603 [Multiple CVE\u0027s]: various critical vulnerabilities in SysAid Help Desk (RCE, file download, DoS, etc)", "tags": [ "mailing-list", "x_refsource_BUGTRAQ", "x_transferred" ], "url": "http://www.securityfocus.com/archive/1/535679/100/0/threaded" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://packetstormsecurity.com/files/132138/SysAid-Help-Desk-14.4-Code-Execution-Denial-Of-Service-Traversal-SQL-Injection.html" }, { "name": "75038", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/75038" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://www.sysaid.com/blog/entry/sysaid-15-2-your-voice-your-service-desk" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2015-06-03T00:00:00", "descriptions": [ { "lang": "en", "value": "Unrestricted file upload vulnerability in ChangePhoto.jsp in SysAid Help Desk before 15.2 allows remote administrators to execute arbitrary code by uploading a file with a .jsp extension, then accessing it via a direct request to the file in icons/user_photo/." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2018-10-09T18:57:01", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "name": "20150603 [Multiple CVE\u0027s]: various critical vulnerabilities in SysAid Help Desk (RCE, file download, DoS, etc)", "tags": [ "mailing-list", "x_refsource_FULLDISC" ], "url": "http://seclists.org/fulldisclosure/2015/Jun/8" }, { "name": "20150603 [Multiple CVE\u0027s]: various critical vulnerabilities in SysAid Help Desk (RCE, file download, DoS, etc)", "tags": [ "mailing-list", "x_refsource_BUGTRAQ" ], "url": "http://www.securityfocus.com/archive/1/535679/100/0/threaded" }, { "tags": [ "x_refsource_MISC" ], "url": "http://packetstormsecurity.com/files/132138/SysAid-Help-Desk-14.4-Code-Execution-Denial-Of-Service-Traversal-SQL-Injection.html" }, { "name": "75038", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/75038" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://www.sysaid.com/blog/entry/sysaid-15-2-your-voice-your-service-desk" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2015-2994", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Unrestricted file upload vulnerability in ChangePhoto.jsp in SysAid Help Desk before 15.2 allows remote administrators to execute arbitrary code by uploading a file with a .jsp extension, then accessing it via a direct request to the file in icons/user_photo/." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "20150603 [Multiple CVE\u0027s]: various critical vulnerabilities in SysAid Help Desk (RCE, file download, DoS, etc)", "refsource": "FULLDISC", "url": "http://seclists.org/fulldisclosure/2015/Jun/8" }, { "name": "20150603 [Multiple CVE\u0027s]: various critical vulnerabilities in SysAid Help Desk (RCE, file download, DoS, etc)", "refsource": "BUGTRAQ", "url": "http://www.securityfocus.com/archive/1/535679/100/0/threaded" }, { "name": "http://packetstormsecurity.com/files/132138/SysAid-Help-Desk-14.4-Code-Execution-Denial-Of-Service-Traversal-SQL-Injection.html", "refsource": "MISC", "url": "http://packetstormsecurity.com/files/132138/SysAid-Help-Desk-14.4-Code-Execution-Denial-Of-Service-Traversal-SQL-Injection.html" }, { "name": "75038", "refsource": "BID", "url": "http://www.securityfocus.com/bid/75038" }, { "name": "https://www.sysaid.com/blog/entry/sysaid-15-2-your-voice-your-service-desk", "refsource": "CONFIRM", "url": "https://www.sysaid.com/blog/entry/sysaid-15-2-your-voice-your-service-desk" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2015-2994", "datePublished": "2015-06-08T14:00:00", "dateReserved": "2015-04-07T00:00:00", "dateUpdated": "2024-08-06T05:32:21.121Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-43971
Vulnerability from cvelistv5
Published
2022-01-11 19:17
Modified
2024-08-04 04:10
Severity ?
EPSS score ?
Summary
A SQL injection vulnerability in /mobile/SelectUsers.jsp in SysAid ITIL 20.4.74 b10 allows a remote authenticated attacker to execute arbitrary SQL commands via the filterText parameter.
References
▼ | URL | Tags |
---|---|---|
https://www.sysaid.com/it-service-management-software/incident-management | x_refsource_MISC | |
https://github.com/atredispartners/advisories/blob/master/ATREDIS-2021-0002.md | x_refsource_MISC | |
https://github.com/atredispartners/advisories/blob/master/ATREDIS-2022-0001.md | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T04:10:17.124Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://www.sysaid.com/it-service-management-software/incident-management" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://github.com/atredispartners/advisories/blob/master/ATREDIS-2021-0002.md" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://github.com/atredispartners/advisories/blob/master/ATREDIS-2022-0001.md" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "descriptions": [ { "lang": "en", "value": "A SQL injection vulnerability in /mobile/SelectUsers.jsp in SysAid ITIL 20.4.74 b10 allows a remote authenticated attacker to execute arbitrary SQL commands via the filterText parameter." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2022-01-11T19:17:47", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://www.sysaid.com/it-service-management-software/incident-management" }, { "tags": [ "x_refsource_MISC" ], "url": "https://github.com/atredispartners/advisories/blob/master/ATREDIS-2021-0002.md" }, { "tags": [ "x_refsource_MISC" ], "url": "https://github.com/atredispartners/advisories/blob/master/ATREDIS-2022-0001.md" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2021-43971", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "A SQL injection vulnerability in /mobile/SelectUsers.jsp in SysAid ITIL 20.4.74 b10 allows a remote authenticated attacker to execute arbitrary SQL commands via the filterText parameter." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "https://www.sysaid.com/it-service-management-software/incident-management", "refsource": "MISC", "url": "https://www.sysaid.com/it-service-management-software/incident-management" }, { "name": "https://github.com/atredispartners/advisories/blob/master/ATREDIS-2021-0002.md", "refsource": "MISC", "url": "https://github.com/atredispartners/advisories/blob/master/ATREDIS-2021-0002.md" }, { "name": "https://github.com/atredispartners/advisories/blob/master/ATREDIS-2022-0001.md", "refsource": "MISC", "url": "https://github.com/atredispartners/advisories/blob/master/ATREDIS-2022-0001.md" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2021-43971", "datePublished": "2022-01-11T19:17:47", "dateReserved": "2021-11-17T00:00:00", "dateUpdated": "2024-08-04T04:10:17.124Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-30486
Vulnerability from cvelistv5
Published
2021-07-22 11:54
Modified
2024-08-03 22:32
Severity ?
EPSS score ?
Summary
SysAid 20.3.64 b14 is affected by Blind and Stacker SQL injection via AssetManagementChart.jsp (GET computerID), AssetManagementChart.jsp (POST group1), AssetManagementList.jsp (GET computerID or group1), or AssetManagementSummary.jsp (GET group1).
References
▼ | URL | Tags |
---|---|---|
https://eh337.net/2021/04/10/sysaid-ii/ | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T22:32:41.132Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://eh337.net/2021/04/10/sysaid-ii/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "descriptions": [ { "lang": "en", "value": "SysAid 20.3.64 b14 is affected by Blind and Stacker SQL injection via AssetManagementChart.jsp (GET computerID), AssetManagementChart.jsp (POST group1), AssetManagementList.jsp (GET computerID or group1), or AssetManagementSummary.jsp (GET group1)." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2021-07-22T11:54:57", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://eh337.net/2021/04/10/sysaid-ii/" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2021-30486", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "SysAid 20.3.64 b14 is affected by Blind and Stacker SQL injection via AssetManagementChart.jsp (GET computerID), AssetManagementChart.jsp (POST group1), AssetManagementList.jsp (GET computerID or group1), or AssetManagementSummary.jsp (GET group1)." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "https://eh337.net/2021/04/10/sysaid-ii/", "refsource": "MISC", "url": "https://eh337.net/2021/04/10/sysaid-ii/" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2021-30486", "datePublished": "2021-07-22T11:54:57", "dateReserved": "2021-04-10T00:00:00", "dateUpdated": "2024-08-03T22:32:41.132Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2022-22796
Vulnerability from cvelistv5
Published
2022-05-12 19:47
Modified
2024-09-17 02:27
Severity ?
EPSS score ?
Summary
Sysaid – Sysaid System Takeover - An attacker can bypass the authentication process by accessing to: /wmiwizard.jsp, Then to: /ConcurrentLogin.jsp, then click on the login button, and it will redirect you to /home.jsp without any authentication.
References
▼ | URL | Tags |
---|---|---|
https://www.gov.il/en/departments/faq/cve_advisories | x_refsource_MISC |
Impacted products
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T03:21:49.117Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://www.gov.il/en/departments/faq/cve_advisories" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "platforms": [ "cloud" ], "product": "Sysaid", "vendor": "SysAid", "versions": [ { "lessThanOrEqual": "21.1.29", "status": "affected", "version": "21.1.29 cloud version", "versionType": "custom" } ] }, { "platforms": [ "on premise" ], "product": "Sysaid", "vendor": "SysAid", "versions": [ { "lessThanOrEqual": "21.4.44", "status": "affected", "version": "21.4.44 on premise version", "versionType": "custom" } ] } ], "credits": [ { "lang": "en", "value": "Dudu Moyal, Gad Abuhatziera, Moriel Harush, Alon Zuker - Sophtix Security LTD" } ], "datePublic": "2022-05-09T00:00:00", "descriptions": [ { "lang": "en", "value": "Sysaid \u2013 Sysaid System Takeover - An attacker can bypass the authentication process by accessing to: /wmiwizard.jsp, Then to: /ConcurrentLogin.jsp, then click on the login button, and it will redirect you to /home.jsp without any authentication." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "ADJACENT_NETWORK", "availabilityImpact": "LOW", "baseScore": 7, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:A/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:L", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "description": "System Take Over", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2022-05-12T19:47:32", "orgId": "a57ee1ae-c9c1-4f40-aa7b-cf10760fde3f", "shortName": "INCD" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://www.gov.il/en/departments/faq/cve_advisories" } ], "solutions": [ { "lang": "en", "value": "Update to 21.1.30 cloud version, or to 21.4.45 on premise version." } ], "source": { "defect": [ "ILVN-2022-0017" ], "discovery": "EXTERNAL" }, "title": "Sysaid \u2013 Sysaid System Takeover", "x_generator": { "engine": "Vulnogram 0.0.9" }, "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cna@cyber.gov.il", "DATE_PUBLIC": "2022-05-09T11:39:00.000Z", "ID": "CVE-2022-22796", "STATE": "PUBLIC", "TITLE": "Sysaid \u2013 Sysaid System Takeover" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Sysaid", "version": { "version_data": [ { "platform": "cloud", "version_affected": "\u003c=", "version_name": "21.1.29 cloud version", "version_value": "21.1.29" }, { "platform": "on premise", "version_affected": "\u003c=", "version_name": "21.4.44 on premise version", "version_value": "21.4.44" } ] } } ] }, "vendor_name": "SysAid" } ] } }, "credit": [ { "lang": "eng", "value": "Dudu Moyal, Gad Abuhatziera, Moriel Harush, Alon Zuker - Sophtix Security LTD" } ], "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Sysaid \u2013 Sysaid System Takeover - An attacker can bypass the authentication process by accessing to: /wmiwizard.jsp, Then to: /ConcurrentLogin.jsp, then click on the login button, and it will redirect you to /home.jsp without any authentication." } ] }, "generator": { "engine": "Vulnogram 0.0.9" }, "impact": { "cvss": { "attackComplexity": "LOW", "attackVector": "ADJACENT_NETWORK", "availabilityImpact": "LOW", "baseScore": 7, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:A/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:L", "version": "3.1" } }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "System Take Over" } ] } ] }, "references": { "reference_data": [ { "name": "https://www.gov.il/en/departments/faq/cve_advisories", "refsource": "MISC", "url": "https://www.gov.il/en/departments/faq/cve_advisories" } ] }, "solution": [ { "lang": "en", "value": "Update to 21.1.30 cloud version, or to 21.4.45 on premise version." } ], "source": { "defect": [ "ILVN-2022-0017" ], "discovery": "EXTERNAL" } } } }, "cveMetadata": { "assignerOrgId": "a57ee1ae-c9c1-4f40-aa7b-cf10760fde3f", "assignerShortName": "INCD", "cveId": "CVE-2022-22796", "datePublished": "2022-05-12T19:47:32.643968Z", "dateReserved": "2022-01-07T00:00:00", "dateUpdated": "2024-09-17T02:27:31.416Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2024-36393
Vulnerability from cvelistv5
Published
2024-06-06 08:18
Modified
2024-08-02 03:37
Severity ?
EPSS score ?
Summary
SysAid - CWE-89: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')
References
{ "containers": { "adp": [ { "affected": [ { "cpes": [ "cpe:2.3:a:sysaid:sysaid:23.3.38:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "sysaid", "vendor": "sysaid", "versions": [ { "status": "affected", "version": "23.3.38" } ] } ], "metrics": [ { "other": { "content": { "id": "CVE-2024-36393", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "total" } ], "role": "CISA Coordinator", "timestamp": "2024-06-06T13:23:19.567575Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-06-06T13:24:30.117Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" }, { "providerMetadata": { "dateUpdated": "2024-08-02T03:37:04.931Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://www.gov.il/en/Departments/faq/cve_advisories" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "SysAid", "vendor": "Sysaid", "versions": [ { "lessThanOrEqual": "23.3.38", "status": "affected", "version": "All versions", "versionType": "custom" } ] } ], "credits": [ { "lang": "en", "type": "finder", "value": "Niv Levy, Daniel Shemesh, Or Ida - CyberArk" } ], "datePublic": "2024-06-06T08:16:00.000Z", "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "\n\n\u003cspan style=\"background-color: rgb(255, 255, 255);\"\u003eSysAid - CWE-89: Improper Neutralization of Special Elements used in an SQL Command (\u0027SQL Injection\u0027)\u003c/span\u003e\n\n" } ], "value": "SysAid - CWE-89: Improper Neutralization of Special Elements used in an SQL Command (\u0027SQL Injection\u0027)" } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.9, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-89", "description": "CWE-89 Improper Neutralization of Special Elements used in an SQL Command (\u0027SQL Injection\u0027)", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-06-06T08:18:52.667Z", "orgId": "a57ee1ae-c9c1-4f40-aa7b-cf10760fde3f", "shortName": "INCD" }, "references": [ { "url": "https://www.gov.il/en/Departments/faq/cve_advisories" } ], "solutions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "\n\n\u003cspan style=\"background-color: rgb(255, 255, 255);\"\u003eUpgrade to version 23.3.38 build 19. Apply configuration changes per \u003c/span\u003e\u003ca target=\"_blank\" rel=\"nofollow\" href=\"https://mcas-proxyweb.mcas.ms/certificate-checker?login=false\u0026amp;originalUrl=https%3A%2F%2Fdocumentation.sysaid.com.mcas.ms%2Fclassic%2Fdocs%2Fsql-sanitizer%3FMcasTsid%3D20893\u0026amp;McasCSRF=e0e2a7c3f95245a60a284c116b19a6e86983b35f3ff1e6c7f840f9bf82646ee5\"\u003ehttps://documentation.sysaid.com/classic/docs/sql-sanitizer\u003c/a\u003e\n\n\u003cbr\u003e" } ], "value": "Upgrade to version 23.3.38 build 19. Apply configuration changes per https://documentation.sysaid.com/classic/docs/sql-sanitizer https://mcas-proxyweb.mcas.ms/certificate-checker" } ], "source": { "advisory": "ILVN-2024-0162", "discovery": "UNKNOWN" }, "title": "SysAid - CWE-89: Improper Neutralization of Special Elements used in an SQL Command (\u0027SQL Injection\u0027)", "x_generator": { "engine": "Vulnogram 0.2.0" } } }, "cveMetadata": { "assignerOrgId": "a57ee1ae-c9c1-4f40-aa7b-cf10760fde3f", "assignerShortName": "INCD", "cveId": "CVE-2024-36393", "datePublished": "2024-06-06T08:18:52.667Z", "dateReserved": "2024-05-27T13:04:44.111Z", "dateUpdated": "2024-08-02T03:37:04.931Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2015-2996
Vulnerability from cvelistv5
Published
2015-06-08 14:00
Modified
2024-08-06 05:32
Severity ?
EPSS score ?
Summary
Multiple directory traversal vulnerabilities in SysAid Help Desk before 15.2 allow remote attackers to (1) read arbitrary files via a .. (dot dot) in the fileName parameter to getGfiUpgradeFile or (2) cause a denial of service (CPU and memory consumption) via a .. (dot dot) in the fileName parameter to calculateRdsFileChecksum.
References
▼ | URL | Tags |
---|---|---|
http://seclists.org/fulldisclosure/2015/Jun/8 | mailing-list, x_refsource_FULLDISC | |
http://www.securityfocus.com/archive/1/535679/100/0/threaded | mailing-list, x_refsource_BUGTRAQ | |
http://packetstormsecurity.com/files/132138/SysAid-Help-Desk-14.4-Code-Execution-Denial-Of-Service-Traversal-SQL-Injection.html | x_refsource_MISC | |
http://www.securityfocus.com/bid/75038 | vdb-entry, x_refsource_BID | |
https://www.sysaid.com/blog/entry/sysaid-15-2-your-voice-your-service-desk | x_refsource_CONFIRM |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T05:32:21.252Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "20150603 [Multiple CVE\u0027s]: various critical vulnerabilities in SysAid Help Desk (RCE, file download, DoS, etc)", "tags": [ "mailing-list", "x_refsource_FULLDISC", "x_transferred" ], "url": "http://seclists.org/fulldisclosure/2015/Jun/8" }, { "name": "20150603 [Multiple CVE\u0027s]: various critical vulnerabilities in SysAid Help Desk (RCE, file download, DoS, etc)", "tags": [ "mailing-list", "x_refsource_BUGTRAQ", "x_transferred" ], "url": "http://www.securityfocus.com/archive/1/535679/100/0/threaded" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://packetstormsecurity.com/files/132138/SysAid-Help-Desk-14.4-Code-Execution-Denial-Of-Service-Traversal-SQL-Injection.html" }, { "name": "75038", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/75038" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://www.sysaid.com/blog/entry/sysaid-15-2-your-voice-your-service-desk" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2015-06-03T00:00:00", "descriptions": [ { "lang": "en", "value": "Multiple directory traversal vulnerabilities in SysAid Help Desk before 15.2 allow remote attackers to (1) read arbitrary files via a .. (dot dot) in the fileName parameter to getGfiUpgradeFile or (2) cause a denial of service (CPU and memory consumption) via a .. (dot dot) in the fileName parameter to calculateRdsFileChecksum." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2018-10-09T18:57:01", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "name": "20150603 [Multiple CVE\u0027s]: various critical vulnerabilities in SysAid Help Desk (RCE, file download, DoS, etc)", "tags": [ "mailing-list", "x_refsource_FULLDISC" ], "url": "http://seclists.org/fulldisclosure/2015/Jun/8" }, { "name": "20150603 [Multiple CVE\u0027s]: various critical vulnerabilities in SysAid Help Desk (RCE, file download, DoS, etc)", "tags": [ "mailing-list", "x_refsource_BUGTRAQ" ], "url": "http://www.securityfocus.com/archive/1/535679/100/0/threaded" }, { "tags": [ "x_refsource_MISC" ], "url": "http://packetstormsecurity.com/files/132138/SysAid-Help-Desk-14.4-Code-Execution-Denial-Of-Service-Traversal-SQL-Injection.html" }, { "name": "75038", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/75038" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://www.sysaid.com/blog/entry/sysaid-15-2-your-voice-your-service-desk" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2015-2996", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Multiple directory traversal vulnerabilities in SysAid Help Desk before 15.2 allow remote attackers to (1) read arbitrary files via a .. (dot dot) in the fileName parameter to getGfiUpgradeFile or (2) cause a denial of service (CPU and memory consumption) via a .. (dot dot) in the fileName parameter to calculateRdsFileChecksum." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "20150603 [Multiple CVE\u0027s]: various critical vulnerabilities in SysAid Help Desk (RCE, file download, DoS, etc)", "refsource": "FULLDISC", "url": "http://seclists.org/fulldisclosure/2015/Jun/8" }, { "name": "20150603 [Multiple CVE\u0027s]: various critical vulnerabilities in SysAid Help Desk (RCE, file download, DoS, etc)", "refsource": "BUGTRAQ", "url": "http://www.securityfocus.com/archive/1/535679/100/0/threaded" }, { "name": "http://packetstormsecurity.com/files/132138/SysAid-Help-Desk-14.4-Code-Execution-Denial-Of-Service-Traversal-SQL-Injection.html", "refsource": "MISC", "url": "http://packetstormsecurity.com/files/132138/SysAid-Help-Desk-14.4-Code-Execution-Denial-Of-Service-Traversal-SQL-Injection.html" }, { "name": "75038", "refsource": "BID", "url": "http://www.securityfocus.com/bid/75038" }, { "name": "https://www.sysaid.com/blog/entry/sysaid-15-2-your-voice-your-service-desk", "refsource": "CONFIRM", "url": "https://www.sysaid.com/blog/entry/sysaid-15-2-your-voice-your-service-desk" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2015-2996", "datePublished": "2015-06-08T14:00:00", "dateReserved": "2015-04-07T00:00:00", "dateUpdated": "2024-08-06T05:32:21.252Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2024-36394
Vulnerability from cvelistv5
Published
2024-06-06 08:20
Modified
2024-08-02 03:37
Severity ?
EPSS score ?
Summary
SysAid - CWE-78: Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
References
{ "containers": { "adp": [ { "affected": [ { "cpes": [ "cpe:2.3:a:sysaid:sysaid:23.3.38:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "sysaid", "vendor": "sysaid", "versions": [ { "lessThanOrEqual": "23.3.38", "status": "affected", "version": "0", "versionType": "custom" } ] } ], "metrics": [ { "other": { "content": { "id": "CVE-2024-36394", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "total" } ], "role": "CISA Coordinator", "timestamp": "2024-06-06T12:56:00.362302Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-06-06T13:05:49.693Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" }, { "providerMetadata": { "dateUpdated": "2024-08-02T03:37:05.138Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://www.gov.il/en/Departments/faq/cve_advisories" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "SysAid", "vendor": "Sysaid", "versions": [ { "lessThanOrEqual": "23.3.38", "status": "affected", "version": "All versions", "versionType": "custom" } ] } ], "credits": [ { "lang": "en", "type": "finder", "value": "Niv Levy, Daniel Shemesh, Or Ida - CyberArk" } ], "datePublic": "2024-06-06T08:16:00.000Z", "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "\n\n\u003ctable\u003e\u003ctbody\u003e\u003ctr\u003e\u003ctd\u003e\u003cp\u003eSysAid - CWE-78: Improper Neutralization of Special Elements used in an OS Command (\u0027OS Command Injection\u0027)\u003c/p\u003e\u003c/td\u003e\u003c/tr\u003e\u003c/tbody\u003e\u003c/table\u003e\n\n" } ], "value": "SysAid - CWE-78: Improper Neutralization of Special Elements used in an OS Command (\u0027OS Command Injection\u0027)" } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.1, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "HIGH", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-78", "description": "CWE-78 Improper Neutralization of Special Elements used in an OS Command (\u0027OS Command Injection\u0027)", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-06-06T08:20:04.781Z", "orgId": "a57ee1ae-c9c1-4f40-aa7b-cf10760fde3f", "shortName": "INCD" }, "references": [ { "url": "https://www.gov.il/en/Departments/faq/cve_advisories" } ], "solutions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "\n\n\u003cspan style=\"background-color: rgb(255, 255, 255);\"\u003eUpgrade to version 23.3.38 build 19. Apply configuration changes per \u003c/span\u003e\u003ca target=\"_blank\" rel=\"nofollow\" href=\"https://mcas-proxyweb.mcas.ms/certificate-checker?login=false\u0026amp;originalUrl=https%3A%2F%2Fdocumentation.sysaid.com.mcas.ms%2Fclassic%2Fdocs%2Fsql-sanitizer%3FMcasTsid%3D20893\u0026amp;McasCSRF=e0e2a7c3f95245a60a284c116b19a6e86983b35f3ff1e6c7f840f9bf82646ee5\"\u003ehttps://documentation.sysaid.com/classic/docs/sql-sanitizer\u003c/a\u003e\n\n\u003cbr\u003e" } ], "value": "Upgrade to version 23.3.38 build 19. Apply configuration changes per https://documentation.sysaid.com/classic/docs/sql-sanitizer https://mcas-proxyweb.mcas.ms/certificate-checker" } ], "source": { "advisory": "ILVN-2024-0163", "discovery": "UNKNOWN" }, "title": "SysAid - CWE-78: Improper Neutralization of Special Elements used in an OS Command (\u0027OS Command Injection\u0027)", "x_generator": { "engine": "Vulnogram 0.2.0" } } }, "cveMetadata": { "assignerOrgId": "a57ee1ae-c9c1-4f40-aa7b-cf10760fde3f", "assignerShortName": "INCD", "cveId": "CVE-2024-36394", "datePublished": "2024-06-06T08:20:04.781Z", "dateReserved": "2024-05-27T13:04:44.111Z", "dateUpdated": "2024-08-02T03:37:05.138Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2014-9436
Vulnerability from cvelistv5
Published
2015-01-02 19:00
Modified
2024-08-06 13:47
Severity ?
EPSS score ?
Summary
Absolute path traversal vulnerability in SysAid On-Premise before 14.4.2 allows remote attackers to read arbitrary files via a \\\\ (four backslashes) in the fileName parameter to getRdsLogFile.
References
▼ | URL | Tags |
---|---|---|
http://www.exploit-db.com/exploits/35593 | exploit, x_refsource_EXPLOIT-DB | |
https://exchange.xforce.ibmcloud.com/vulnerabilities/99456 | vdb-entry, x_refsource_XF | |
http://packetstormsecurity.com/files/129705/SysAid-Server-Arbitrary-File-Disclosure.html | x_refsource_MISC | |
http://seclists.org/fulldisclosure/2014/Dec/99 | mailing-list, x_refsource_FULLDISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T13:47:40.373Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "35593", "tags": [ "exploit", "x_refsource_EXPLOIT-DB", "x_transferred" ], "url": "http://www.exploit-db.com/exploits/35593" }, { "name": "sysaidserver-filename-dir-traversal(99456)", "tags": [ "vdb-entry", "x_refsource_XF", "x_transferred" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/99456" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://packetstormsecurity.com/files/129705/SysAid-Server-Arbitrary-File-Disclosure.html" }, { "name": "20141222 VP-2014-004 SysAid Server Arbitrary File Disclosure", "tags": [ "mailing-list", "x_refsource_FULLDISC", "x_transferred" ], "url": "http://seclists.org/fulldisclosure/2014/Dec/99" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2014-12-22T00:00:00", "descriptions": [ { "lang": "en", "value": "Absolute path traversal vulnerability in SysAid On-Premise before 14.4.2 allows remote attackers to read arbitrary files via a \\\\\\\\ (four backslashes) in the fileName parameter to getRdsLogFile." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2017-09-07T15:57:01", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "name": "35593", "tags": [ "exploit", "x_refsource_EXPLOIT-DB" ], "url": "http://www.exploit-db.com/exploits/35593" }, { "name": "sysaidserver-filename-dir-traversal(99456)", "tags": [ "vdb-entry", "x_refsource_XF" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/99456" }, { "tags": [ "x_refsource_MISC" ], "url": "http://packetstormsecurity.com/files/129705/SysAid-Server-Arbitrary-File-Disclosure.html" }, { "name": "20141222 VP-2014-004 SysAid Server Arbitrary File Disclosure", "tags": [ "mailing-list", "x_refsource_FULLDISC" ], "url": "http://seclists.org/fulldisclosure/2014/Dec/99" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2014-9436", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Absolute path traversal vulnerability in SysAid On-Premise before 14.4.2 allows remote attackers to read arbitrary files via a \\\\\\\\ (four backslashes) in the fileName parameter to getRdsLogFile." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "35593", "refsource": "EXPLOIT-DB", "url": "http://www.exploit-db.com/exploits/35593" }, { "name": "sysaidserver-filename-dir-traversal(99456)", "refsource": "XF", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/99456" }, { "name": "http://packetstormsecurity.com/files/129705/SysAid-Server-Arbitrary-File-Disclosure.html", "refsource": "MISC", "url": "http://packetstormsecurity.com/files/129705/SysAid-Server-Arbitrary-File-Disclosure.html" }, { "name": "20141222 VP-2014-004 SysAid Server Arbitrary File Disclosure", "refsource": "FULLDISC", "url": "http://seclists.org/fulldisclosure/2014/Dec/99" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2014-9436", "datePublished": "2015-01-02T19:00:00", "dateReserved": "2015-01-02T00:00:00", "dateUpdated": "2024-08-06T13:47:40.373Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2015-2995
Vulnerability from cvelistv5
Published
2015-06-08 14:00
Modified
2024-08-06 05:32
Severity ?
EPSS score ?
Summary
The RdsLogsEntry servlet in SysAid Help Desk before 15.2 does not properly check file extensions, which allows remote attackers to upload and execute arbitrary files via a NULL byte after the extension, as demonstrated by a .war%00 file.
References
▼ | URL | Tags |
---|---|---|
http://www.rapid7.com/db/modules/exploit/multi/http/sysaid_rdslogs_file_upload | x_refsource_MISC | |
http://seclists.org/fulldisclosure/2015/Jun/8 | mailing-list, x_refsource_FULLDISC | |
http://www.securityfocus.com/archive/1/535679/100/0/threaded | mailing-list, x_refsource_BUGTRAQ | |
http://packetstormsecurity.com/files/132138/SysAid-Help-Desk-14.4-Code-Execution-Denial-Of-Service-Traversal-SQL-Injection.html | x_refsource_MISC | |
http://www.securityfocus.com/bid/75038 | vdb-entry, x_refsource_BID | |
https://www.exploit-db.com/exploits/37667/ | exploit, x_refsource_EXPLOIT-DB | |
https://www.sysaid.com/blog/entry/sysaid-15-2-your-voice-your-service-desk | x_refsource_CONFIRM |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T05:32:21.342Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://www.rapid7.com/db/modules/exploit/multi/http/sysaid_rdslogs_file_upload" }, { "name": "20150603 [Multiple CVE\u0027s]: various critical vulnerabilities in SysAid Help Desk (RCE, file download, DoS, etc)", "tags": [ "mailing-list", "x_refsource_FULLDISC", "x_transferred" ], "url": "http://seclists.org/fulldisclosure/2015/Jun/8" }, { "name": "20150603 [Multiple CVE\u0027s]: various critical vulnerabilities in SysAid Help Desk (RCE, file download, DoS, etc)", "tags": [ "mailing-list", "x_refsource_BUGTRAQ", "x_transferred" ], "url": "http://www.securityfocus.com/archive/1/535679/100/0/threaded" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://packetstormsecurity.com/files/132138/SysAid-Help-Desk-14.4-Code-Execution-Denial-Of-Service-Traversal-SQL-Injection.html" }, { "name": "75038", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/75038" }, { "name": "37667", "tags": [ "exploit", "x_refsource_EXPLOIT-DB", "x_transferred" ], "url": "https://www.exploit-db.com/exploits/37667/" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://www.sysaid.com/blog/entry/sysaid-15-2-your-voice-your-service-desk" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2015-06-03T00:00:00", "descriptions": [ { "lang": "en", "value": "The RdsLogsEntry servlet in SysAid Help Desk before 15.2 does not properly check file extensions, which allows remote attackers to upload and execute arbitrary files via a NULL byte after the extension, as demonstrated by a .war%00 file." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2018-10-09T18:57:01", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "http://www.rapid7.com/db/modules/exploit/multi/http/sysaid_rdslogs_file_upload" }, { "name": "20150603 [Multiple CVE\u0027s]: various critical vulnerabilities in SysAid Help Desk (RCE, file download, DoS, etc)", "tags": [ "mailing-list", "x_refsource_FULLDISC" ], "url": "http://seclists.org/fulldisclosure/2015/Jun/8" }, { "name": "20150603 [Multiple CVE\u0027s]: various critical vulnerabilities in SysAid Help Desk (RCE, file download, DoS, etc)", "tags": [ "mailing-list", "x_refsource_BUGTRAQ" ], "url": "http://www.securityfocus.com/archive/1/535679/100/0/threaded" }, { "tags": [ "x_refsource_MISC" ], "url": "http://packetstormsecurity.com/files/132138/SysAid-Help-Desk-14.4-Code-Execution-Denial-Of-Service-Traversal-SQL-Injection.html" }, { "name": "75038", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/75038" }, { "name": "37667", "tags": [ "exploit", "x_refsource_EXPLOIT-DB" ], "url": "https://www.exploit-db.com/exploits/37667/" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://www.sysaid.com/blog/entry/sysaid-15-2-your-voice-your-service-desk" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2015-2995", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "The RdsLogsEntry servlet in SysAid Help Desk before 15.2 does not properly check file extensions, which allows remote attackers to upload and execute arbitrary files via a NULL byte after the extension, as demonstrated by a .war%00 file." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "http://www.rapid7.com/db/modules/exploit/multi/http/sysaid_rdslogs_file_upload", "refsource": "MISC", "url": "http://www.rapid7.com/db/modules/exploit/multi/http/sysaid_rdslogs_file_upload" }, { "name": "20150603 [Multiple CVE\u0027s]: various critical vulnerabilities in SysAid Help Desk (RCE, file download, DoS, etc)", "refsource": "FULLDISC", "url": "http://seclists.org/fulldisclosure/2015/Jun/8" }, { "name": "20150603 [Multiple CVE\u0027s]: various critical vulnerabilities in SysAid Help Desk (RCE, file download, DoS, etc)", "refsource": "BUGTRAQ", "url": "http://www.securityfocus.com/archive/1/535679/100/0/threaded" }, { "name": "http://packetstormsecurity.com/files/132138/SysAid-Help-Desk-14.4-Code-Execution-Denial-Of-Service-Traversal-SQL-Injection.html", "refsource": "MISC", "url": "http://packetstormsecurity.com/files/132138/SysAid-Help-Desk-14.4-Code-Execution-Denial-Of-Service-Traversal-SQL-Injection.html" }, { "name": "75038", "refsource": "BID", "url": "http://www.securityfocus.com/bid/75038" }, { "name": "37667", "refsource": "EXPLOIT-DB", "url": "https://www.exploit-db.com/exploits/37667/" }, { "name": "https://www.sysaid.com/blog/entry/sysaid-15-2-your-voice-your-service-desk", "refsource": "CONFIRM", "url": "https://www.sysaid.com/blog/entry/sysaid-15-2-your-voice-your-service-desk" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2015-2995", "datePublished": "2015-06-08T14:00:00", "dateReserved": "2015-04-07T00:00:00", "dateUpdated": "2024-08-06T05:32:21.342Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2022-22798
Vulnerability from cvelistv5
Published
2022-05-12 19:48
Modified
2024-09-17 02:47
Severity ?
EPSS score ?
Summary
Sysaid – Pro Plus Edition, SysAid Help Desk Broken Access Control v20.4.74 b10, v22.1.20 b62, v22.1.30 b49 - An attacker needs to log in as a guest after that the system redirects him to the service portal or EndUserPortal.JSP, then he needs to change the path in the URL to /ConcurrentLogin%2ejsp after that he will receive an error message with a login button, by clicking on it, he will connect to the system dashboard. The attacker can receive sensitive data like server details, usernames, workstations, etc. He can also perform actions such as uploading files, deleting calls from the system.
References
▼ | URL | Tags |
---|---|---|
https://www.gov.il/en/departments/faq/cve_advisories | x_refsource_MISC |
Impacted products
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T03:21:49.115Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://www.gov.il/en/departments/faq/cve_advisories" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "platforms": [ "cloud" ], "product": "Sysaid", "vendor": "SysAid", "versions": [ { "lessThanOrEqual": "22.1.49", "status": "affected", "version": "22.1.49 cloud version", "versionType": "custom" } ] }, { "platforms": [ "on premise" ], "product": "Sysaid", "vendor": "SysAid", "versions": [ { "lessThanOrEqual": "22.1.63", "status": "affected", "version": "22.1.63 on premise version", "versionType": "custom" } ] } ], "credits": [ { "lang": "en", "value": "Gad Abuhatzeira, Alon Zuker - Sophtix Security LTD" } ], "datePublic": "2022-05-09T00:00:00", "descriptions": [ { "lang": "en", "value": "Sysaid \u2013 Pro Plus Edition, SysAid Help Desk Broken Access Control v20.4.74 b10, v22.1.20 b62, v22.1.30 b49 - An attacker needs to log in as a guest after that the system redirects him to the service portal or EndUserPortal.JSP, then he needs to change the path in the URL to /ConcurrentLogin%2ejsp after that he will receive an error message with a login button, by clicking on it, he will connect to the system dashboard. The attacker can receive sensitive data like server details, usernames, workstations, etc. He can also perform actions such as uploading files, deleting calls from the system." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "LOW", "baseScore": 6.8, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:L", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "description": "Broken Access Control", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2022-05-12T19:48:42", "orgId": "a57ee1ae-c9c1-4f40-aa7b-cf10760fde3f", "shortName": "INCD" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://www.gov.il/en/departments/faq/cve_advisories" } ], "solutions": [ { "lang": "en", "value": "Update to 22.1.50 cloud version, or to 22.1.64 on premise version." } ], "source": { "defect": [ "ILVN-2022-0019" ], "discovery": "EXTERNAL" }, "title": "Sysaid \u2013 Pro Plus Edition, SysAid Help Desk Broken Access Control", "x_generator": { "engine": "Vulnogram 0.0.9" }, "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cna@cyber.gov.il", "DATE_PUBLIC": "2022-05-09T11:39:00.000Z", "ID": "CVE-2022-22798", "STATE": "PUBLIC", "TITLE": "Sysaid \u2013 Pro Plus Edition, SysAid Help Desk Broken Access Control" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Sysaid", "version": { "version_data": [ { "platform": "cloud", "version_affected": "\u003c=", "version_name": "22.1.49 cloud version", "version_value": "22.1.49" }, { "platform": "on premise", "version_affected": "\u003c=", "version_name": "22.1.63 on premise version", "version_value": "22.1.63" } ] } } ] }, "vendor_name": "SysAid" } ] } }, "credit": [ { "lang": "eng", "value": "Gad Abuhatzeira, Alon Zuker - Sophtix Security LTD" } ], "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Sysaid \u2013 Pro Plus Edition, SysAid Help Desk Broken Access Control v20.4.74 b10, v22.1.20 b62, v22.1.30 b49 - An attacker needs to log in as a guest after that the system redirects him to the service portal or EndUserPortal.JSP, then he needs to change the path in the URL to /ConcurrentLogin%2ejsp after that he will receive an error message with a login button, by clicking on it, he will connect to the system dashboard. The attacker can receive sensitive data like server details, usernames, workstations, etc. He can also perform actions such as uploading files, deleting calls from the system." } ] }, "generator": { "engine": "Vulnogram 0.0.9" }, "impact": { "cvss": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "LOW", "baseScore": 6.8, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:L", "version": "3.1" } }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Broken Access Control" } ] } ] }, "references": { "reference_data": [ { "name": "https://www.gov.il/en/departments/faq/cve_advisories", "refsource": "MISC", "url": "https://www.gov.il/en/departments/faq/cve_advisories" } ] }, "solution": [ { "lang": "en", "value": "Update to 22.1.50 cloud version, or to 22.1.64 on premise version." } ], "source": { "defect": [ "ILVN-2022-0019" ], "discovery": "EXTERNAL" } } } }, "cveMetadata": { "assignerOrgId": "a57ee1ae-c9c1-4f40-aa7b-cf10760fde3f", "assignerShortName": "INCD", "cveId": "CVE-2022-22798", "datePublished": "2022-05-12T19:48:42.372877Z", "dateReserved": "2022-01-07T00:00:00", "dateUpdated": "2024-09-17T02:47:50.302Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2022-22797
Vulnerability from cvelistv5
Published
2022-05-12 19:48
Modified
2024-09-16 19:51
Severity ?
EPSS score ?
Summary
Sysaid – sysaid Open Redirect - An Attacker can change the redirect link at the parameter "redirectURL" from"GET" request from the url location: /CommunitySSORedirect.jsp?redirectURL=https://google.com. Unvalidated redirects and forwards are possible when a web application accepts untrusted input that could cause the web application to redirect the request to a URL contained within untrusted input. By modifying untrusted URL input to a malicious site, an attacker may successfully launch a phishing scam and steal user credentials.
References
▼ | URL | Tags |
---|---|---|
https://www.gov.il/en/departments/faq/cve_advisories | x_refsource_MISC |
Impacted products
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T03:21:49.155Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://www.gov.il/en/departments/faq/cve_advisories" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "platforms": [ "cloud" ], "product": "Sysaid", "vendor": "SysAid", "versions": [ { "lessThanOrEqual": "22.1.49", "status": "affected", "version": "22.1.49 cloud version", "versionType": "custom" } ] }, { "platforms": [ "on premise" ], "product": "Sysaid", "vendor": "SysAid", "versions": [ { "lessThanOrEqual": "22.1.63", "status": "affected", "version": "22.1.63 on premise version", "versionType": "custom" } ] } ], "credits": [ { "lang": "en", "value": "Moriel Harush - Sophtix Security LTD" } ], "datePublic": "2022-05-09T00:00:00", "descriptions": [ { "lang": "en", "value": "Sysaid \u2013 sysaid Open Redirect - An Attacker can change the redirect link at the parameter \"redirectURL\" from\"GET\" request from the url location: /CommunitySSORedirect.jsp?redirectURL=https://google.com. Unvalidated redirects and forwards are possible when a web application accepts untrusted input that could cause the web application to redirect the request to a URL contained within untrusted input. By modifying untrusted URL input to a malicious site, an attacker may successfully launch a phishing scam and steal user credentials." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 4.6, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "LOW", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-601", "description": "CWE-601 URL Redirection to Untrusted Site (\u0027Open Redirect\u0027)", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2022-05-12T19:48:08", "orgId": "a57ee1ae-c9c1-4f40-aa7b-cf10760fde3f", "shortName": "INCD" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://www.gov.il/en/departments/faq/cve_advisories" } ], "solutions": [ { "lang": "en", "value": "Update to 22.1.50 cloud version, or to 22.1.64 on premise version." } ], "source": { "defect": [ "ILVN-2022-0018" ], "discovery": "EXTERNAL" }, "title": "Sysaid \u2013 sysaid Open Redirect", "x_generator": { "engine": "Vulnogram 0.0.9" }, "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cna@cyber.gov.il", "DATE_PUBLIC": "2022-05-09T11:39:00.000Z", "ID": "CVE-2022-22797", "STATE": "PUBLIC", "TITLE": "Sysaid \u2013 sysaid Open Redirect" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Sysaid", "version": { "version_data": [ { "platform": "cloud", "version_affected": "\u003c=", "version_name": "22.1.49 cloud version", "version_value": "22.1.49" }, { "platform": "on premise", "version_affected": "\u003c=", "version_name": "22.1.63 on premise version", "version_value": "22.1.63" } ] } } ] }, "vendor_name": "SysAid" } ] } }, "credit": [ { "lang": "eng", "value": "Moriel Harush - Sophtix Security LTD" } ], "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Sysaid \u2013 sysaid Open Redirect - An Attacker can change the redirect link at the parameter \"redirectURL\" from\"GET\" request from the url location: /CommunitySSORedirect.jsp?redirectURL=https://google.com. Unvalidated redirects and forwards are possible when a web application accepts untrusted input that could cause the web application to redirect the request to a URL contained within untrusted input. By modifying untrusted URL input to a malicious site, an attacker may successfully launch a phishing scam and steal user credentials." } ] }, "generator": { "engine": "Vulnogram 0.0.9" }, "impact": { "cvss": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 4.6, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "LOW", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", "version": "3.1" } }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-601 URL Redirection to Untrusted Site (\u0027Open Redirect\u0027)" } ] } ] }, "references": { "reference_data": [ { "name": "https://www.gov.il/en/departments/faq/cve_advisories", "refsource": "MISC", "url": "https://www.gov.il/en/departments/faq/cve_advisories" } ] }, "solution": [ { "lang": "en", "value": "Update to 22.1.50 cloud version, or to 22.1.64 on premise version." } ], "source": { "defect": [ "ILVN-2022-0018" ], "discovery": "EXTERNAL" } } } }, "cveMetadata": { "assignerOrgId": "a57ee1ae-c9c1-4f40-aa7b-cf10760fde3f", "assignerShortName": "INCD", "cveId": "CVE-2022-22797", "datePublished": "2022-05-12T19:48:08.939813Z", "dateReserved": "2022-01-07T00:00:00", "dateUpdated": "2024-09-16T19:51:58.210Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2024-27775
Vulnerability from cvelistv5
Published
2024-03-28 12:19
Modified
2024-08-02 00:41
Severity ?
EPSS score ?
Summary
SysAid before version 23.2.14 b18 - CWE-918: Server-Side Request Forgery (SSRF) may allow exposing the local OS user's NTLMv2 hash
References
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2024-27775", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-04-10T19:45:47.358316Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-06-04T17:47:20.997Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" }, { "providerMetadata": { "dateUpdated": "2024-08-02T00:41:54.967Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://www.gov.il/en/Departments/faq/cve_advisories" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "SysAid", "vendor": "SysAid", "versions": [ { "lessThanOrEqual": "Upgrade to version 23.3.38 or later", "status": "affected", "version": "version 23.2.14 b18", "versionType": "custom" } ] } ], "credits": [ { "lang": "en", "type": "finder", "value": "Niv Levy" } ], "datePublic": "2024-03-28T12:18:00.000Z", "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "\n\n\u003cspan style=\"background-color: rgb(255, 255, 255);\"\u003eSysAid before version 23.2.14 b18 -\u0026nbsp;\u003cspan style=\"background-color: rgb(255, 255, 255);\"\u003eCWE-918: Server-Side Request Forgery (SSRF) may allow exposing the local OS user\u0027s NTLMv2 hash\u003c/span\u003e\n\n\u003c/span\u003e" } ], "value": "\nSysAid before version 23.2.14 b18 -\u00a0CWE-918: Server-Side Request Forgery (SSRF) may allow exposing the local OS user\u0027s NTLMv2 hash\n\n" } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.2, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-918", "description": "CWE-918 Server-Side Request Forgery (SSRF)", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-03-28T12:19:53.385Z", "orgId": "a57ee1ae-c9c1-4f40-aa7b-cf10760fde3f", "shortName": "INCD" }, "references": [ { "url": "https://www.gov.il/en/Departments/faq/cve_advisories" } ], "solutions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "\n\n\u003cspan style=\"background-color: rgb(255, 255, 255);\"\u003eUpgrade to version 23.3.38 or later\u003c/span\u003e\n\n\u003cbr\u003e" } ], "value": "\nUpgrade to version 23.3.38 or later\n\n" } ], "source": { "advisory": "ILVN-2024-0155", "discovery": "UNKNOWN" }, "title": "SysAid - CWE-918: Server-Side Request Forgery (SSRF)", "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "a57ee1ae-c9c1-4f40-aa7b-cf10760fde3f", "assignerShortName": "INCD", "cveId": "CVE-2024-27775", "datePublished": "2024-03-28T12:19:53.385Z", "dateReserved": "2024-02-26T09:27:55.323Z", "dateUpdated": "2024-08-02T00:41:54.967Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2022-23166
Vulnerability from cvelistv5
Published
2022-05-12 19:49
Modified
2024-09-16 22:24
Severity ?
EPSS score ?
Summary
Sysaid – Sysaid Local File Inclusion (LFI) – An unauthenticated attacker can access to the system by accessing to "/lib/tinymce/examples/index.html" path. in the "Insert/Edit Embedded Media" window Choose Type : iFrame and File/URL : [here is the LFI] Solution: Update to 22.2.20 cloud version, or to 22.1.64 on premise version.
References
▼ | URL | Tags |
---|---|---|
https://www.gov.il/en/departments/faq/cve_advisories | x_refsource_MISC |
Impacted products
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T03:36:20.001Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://www.gov.il/en/departments/faq/cve_advisories" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "platforms": [ "cloud" ], "product": "Sysaid", "vendor": "SysAid", "versions": [ { "lessThanOrEqual": "22.2.19", "status": "affected", "version": "22.2.19 cloud version", "versionType": "custom" } ] }, { "platforms": [ "on premise" ], "product": "Sysaid", "vendor": "SysAid", "versions": [ { "lessThanOrEqual": "22.1.63", "status": "affected", "version": "22.1.63 on premise version", "versionType": "custom" } ] } ], "credits": [ { "lang": "en", "value": "Dudu Moyal - Sophtix Security LTD" } ], "datePublic": "2022-05-09T00:00:00", "descriptions": [ { "lang": "en", "value": "Sysaid \u2013 Sysaid Local File Inclusion (LFI) \u2013 An unauthenticated attacker can access to the system by accessing to \"/lib/tinymce/examples/index.html\" path. in the \"Insert/Edit Embedded Media\" window Choose Type : iFrame and File/URL : [here is the LFI] Solution: Update to 22.2.20 cloud version, or to 22.1.64 on premise version." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "LOW", "baseScore": 6.1, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "LOW", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:L/A:L", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "description": "Local File Inclusion", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2022-05-12T19:49:52", "orgId": "a57ee1ae-c9c1-4f40-aa7b-cf10760fde3f", "shortName": "INCD" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://www.gov.il/en/departments/faq/cve_advisories" } ], "solutions": [ { "lang": "en", "value": "Update to 22.2.20 cloud version, or to 22.1.64 on premise version." } ], "source": { "defect": [ "ILVN-2022-0021" ], "discovery": "EXTERNAL" }, "title": "Sysaid \u2013 Sysaid Local File Inclusion (LFI)", "x_generator": { "engine": "Vulnogram 0.0.9" }, "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cna@cyber.gov.il", "DATE_PUBLIC": "2022-05-09T11:39:00.000Z", "ID": "CVE-2022-23166", "STATE": "PUBLIC", "TITLE": "Sysaid \u2013 Sysaid Local File Inclusion (LFI)" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Sysaid", "version": { "version_data": [ { "platform": "cloud", "version_affected": "\u003c=", "version_name": "22.2.19 cloud version", "version_value": "22.2.19" }, { "platform": "on premise", "version_affected": "\u003c=", "version_name": "22.1.63 on premise version", "version_value": "22.1.63" } ] } } ] }, "vendor_name": "SysAid" } ] } }, "credit": [ { "lang": "eng", "value": "Dudu Moyal - Sophtix Security LTD" } ], "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Sysaid \u2013 Sysaid Local File Inclusion (LFI) \u2013 An unauthenticated attacker can access to the system by accessing to \"/lib/tinymce/examples/index.html\" path. in the \"Insert/Edit Embedded Media\" window Choose Type : iFrame and File/URL : [here is the LFI] Solution: Update to 22.2.20 cloud version, or to 22.1.64 on premise version." } ] }, "generator": { "engine": "Vulnogram 0.0.9" }, "impact": { "cvss": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "LOW", "baseScore": 6.1, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "LOW", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:L/A:L", "version": "3.1" } }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Local File Inclusion" } ] } ] }, "references": { "reference_data": [ { "name": "https://www.gov.il/en/departments/faq/cve_advisories", "refsource": "MISC", "url": "https://www.gov.il/en/departments/faq/cve_advisories" } ] }, "solution": [ { "lang": "en", "value": "Update to 22.2.20 cloud version, or to 22.1.64 on premise version." } ], "source": { "defect": [ "ILVN-2022-0021" ], "discovery": "EXTERNAL" } } } }, "cveMetadata": { "assignerOrgId": "a57ee1ae-c9c1-4f40-aa7b-cf10760fde3f", "assignerShortName": "INCD", "cveId": "CVE-2022-23166", "datePublished": "2022-05-12T19:49:52.719777Z", "dateReserved": "2022-01-11T00:00:00", "dateUpdated": "2024-09-16T22:24:47.336Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }