fkie_cve-2022-27547
Vulnerability from fkie_nvd
Published
2022-08-29 16:15
Modified
2024-11-21 06:55
Severity ?
6.1 (Medium) - CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:N/A:N
7.4 (High) - CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:N/A:N
7.4 (High) - CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:N/A:N
Summary
HCL iNotes is susceptible to a link to non-existent domain vulnerability. An attacker could use this vulnerability to trick a user into supplying sensitive information such as username, password, credit card number, etc.
References
Impacted products
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:hcltech:hcl_inotes:9.0.1:-:*:*:*:*:*:*", "matchCriteriaId": "208ABCA3-9B6B-4EEB-82AB-63E51B0694C0", "vulnerable": true }, { "criteria": "cpe:2.3:a:hcltech:hcl_inotes:9.0.1:fixpack_10:*:*:*:*:*:*", "matchCriteriaId": "EF0007DB-2AC2-481C-AE80-520BF47182D0", "vulnerable": true }, { "criteria": "cpe:2.3:a:hcltech:hcl_inotes:9.0.1:fixpack_3:*:*:*:*:*:*", "matchCriteriaId": "17D094C3-FBE2-4890-87AE-F1DB22564B53", "vulnerable": true }, { "criteria": "cpe:2.3:a:hcltech:hcl_inotes:9.0.1:fixpack_4:*:*:*:*:*:*", "matchCriteriaId": "ABED4B62-2D70-4693-8195-639D9E013AAB", "vulnerable": true }, { "criteria": "cpe:2.3:a:hcltech:hcl_inotes:9.0.1:fixpack_5:*:*:*:*:*:*", "matchCriteriaId": "FB3D516A-593C-42E8-A9BC-0F7FEF17CD6F", "vulnerable": true }, { "criteria": "cpe:2.3:a:hcltech:hcl_inotes:9.0.1:fixpack_6:*:*:*:*:*:*", "matchCriteriaId": "3432DA33-2147-47B9-9F8E-4CD12AF73B76", "vulnerable": true }, { "criteria": "cpe:2.3:a:hcltech:hcl_inotes:9.0.1:fixpack_7:*:*:*:*:*:*", "matchCriteriaId": "D8436BBE-224D-4E6A-B8D1-C778749B7EA7", "vulnerable": true }, { "criteria": "cpe:2.3:a:hcltech:hcl_inotes:9.0.1:fixpack_8:*:*:*:*:*:*", "matchCriteriaId": "4775916C-8806-41FD-9B82-D6D0163BB0F2", "vulnerable": true }, { "criteria": "cpe:2.3:a:hcltech:hcl_inotes:9.0.1:fixpack_9:*:*:*:*:*:*", "matchCriteriaId": "A952F356-3A08-4A19-B716-03A7CD46C68E", "vulnerable": true }, { "criteria": "cpe:2.3:a:hcltech:hcl_inotes:10.0:*:*:*:*:*:*:*", "matchCriteriaId": "028F0C13-A975-4DAE-B578-40AFA7FABEE8", "vulnerable": true }, { "criteria": "cpe:2.3:a:hcltech:hcl_inotes:10.0.1:-:*:*:*:*:*:*", "matchCriteriaId": "6DB5111E-B70F-475F-A23D-DF08FD1AB97E", "vulnerable": true }, { "criteria": "cpe:2.3:a:hcltech:hcl_inotes:10.0.1:fixpack_1:*:*:*:*:*:*", "matchCriteriaId": "C1D927FD-BD55-4FD4-9212-C8108B69D7ED", "vulnerable": true }, { "criteria": "cpe:2.3:a:hcltech:hcl_inotes:10.0.1:fixpack_2:*:*:*:*:*:*", "matchCriteriaId": "1D8203EA-5986-47EB-AB05-EFE068C3B34C", "vulnerable": true }, { "criteria": "cpe:2.3:a:hcltech:hcl_inotes:10.0.1:fixpack_3:*:*:*:*:*:*", "matchCriteriaId": "BACEE95B-6B63-4734-97A9-2CAEEFA01187", "vulnerable": true }, { "criteria": "cpe:2.3:a:hcltech:hcl_inotes:10.0.1:fixpack_4:*:*:*:*:*:*", "matchCriteriaId": "7240C49C-F627-4C24-BF8D-35D9E32CA7EA", "vulnerable": true }, { "criteria": "cpe:2.3:a:hcltech:hcl_inotes:10.0.1:fixpack_5:*:*:*:*:*:*", "matchCriteriaId": "A030CB7F-B219-4497-8A87-46BA5A2038F1", "vulnerable": true }, { "criteria": "cpe:2.3:a:hcltech:hcl_inotes:10.0.1:fixpack_6:*:*:*:*:*:*", "matchCriteriaId": "2CBADD58-2E61-48D0-A1B8-1C725FCD907D", "vulnerable": true }, { "criteria": "cpe:2.3:a:hcltech:hcl_inotes:10.0.1:fixpack_7:*:*:*:*:*:*", "matchCriteriaId": "18A495DC-905C-4421-A6FE-EF6655098DA4", "vulnerable": true }, { "criteria": "cpe:2.3:a:hcltech:hcl_inotes:10.0.1:fixpack_8:*:*:*:*:*:*", "matchCriteriaId": "BD32C7F1-9B97-47DF-A09C-766DC5D58164", "vulnerable": true }, { "criteria": "cpe:2.3:a:hcltech:hcl_inotes:11.0:*:*:*:*:*:*:*", "matchCriteriaId": "BECB00A0-AD89-4E44-B758-45AA5C596018", "vulnerable": true }, { "criteria": "cpe:2.3:a:hcltech:hcl_inotes:11.0.1:-:*:*:*:*:*:*", "matchCriteriaId": "2433DEDD-8650-4B01-85B9-92F5D1446030", "vulnerable": true }, { "criteria": "cpe:2.3:a:hcltech:hcl_inotes:11.0.1:fixpack_1:*:*:*:*:*:*", "matchCriteriaId": "054C377C-7B4E-4825-B567-D85232EEDF09", "vulnerable": true }, { "criteria": "cpe:2.3:a:hcltech:hcl_inotes:11.0.1:fixpack_2:*:*:*:*:*:*", "matchCriteriaId": "C1BFC253-23A1-42BE-A786-12D8A51862F6", "vulnerable": true }, { "criteria": "cpe:2.3:a:hcltech:hcl_inotes:11.0.1:fixpack_3:*:*:*:*:*:*", "matchCriteriaId": "85C8610A-7365-4B3C-AACD-932A9EEF3F75", "vulnerable": true }, { "criteria": "cpe:2.3:a:hcltech:hcl_inotes:11.0.1:fixpack_4:*:*:*:*:*:*", "matchCriteriaId": "1BDDC0D0-D7C2-4487-AEB1-39B40DAC68CF", "vulnerable": true }, { "criteria": "cpe:2.3:a:hcltech:hcl_inotes:11.0.1:fixpack_5:*:*:*:*:*:*", "matchCriteriaId": "00BC19F7-8098-43D4-97C3-8CA1A63A94B8", "vulnerable": true }, { "criteria": "cpe:2.3:a:hcltech:hcl_inotes:12.0:*:*:*:*:*:*:*", "matchCriteriaId": "3B897EE8-EFCD-4D1C-9B83-96BDB596DF52", "vulnerable": true }, { "criteria": "cpe:2.3:a:hcltech:hcl_inotes:12.0.1:-:*:*:*:*:*:*", "matchCriteriaId": "9CD07D2A-E283-48C8-B110-95D656CF953A", "vulnerable": true }, { "criteria": "cpe:2.3:a:hcltech:hcl_inotes:12.0.1:fixpack_1:*:*:*:*:*:*", "matchCriteriaId": "3AF3FF6F-3E3F-44D5-9B8F-E0784A5B376F", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:hcltech:domino:9.0:*:*:*:*:*:*:*", "matchCriteriaId": "0F1C7C9C-2F6E-4A82-BC16-B04E53B11E20", "vulnerable": true }, { "criteria": "cpe:2.3:a:hcltech:domino:9.0.1:-:*:*:*:*:*:*", "matchCriteriaId": "4E0BF886-B732-4210-82AA-4D2B3F77132B", "vulnerable": true }, { "criteria": "cpe:2.3:a:hcltech:domino:9.0.1:fixpack_10:*:*:*:*:*:*", "matchCriteriaId": "866FCD8A-56FE-4D00-A9F6-F83D3400CF91", "vulnerable": true }, { "criteria": "cpe:2.3:a:hcltech:domino:9.0.1:fixpack_3:*:*:*:*:*:*", "matchCriteriaId": "9F8486D8-494D-45B0-8447-F1EDB8C2F8A5", "vulnerable": true }, { "criteria": "cpe:2.3:a:hcltech:domino:9.0.1:fixpack_4:*:*:*:*:*:*", "matchCriteriaId": "19CC1B88-ED3D-4AD0-8B06-C75D198E1BB3", "vulnerable": true }, { "criteria": "cpe:2.3:a:hcltech:domino:9.0.1:fixpack_5:*:*:*:*:*:*", "matchCriteriaId": "C76546DF-A75A-489C-80D8-D1372F2FF586", "vulnerable": true }, { "criteria": "cpe:2.3:a:hcltech:domino:9.0.1:fixpack_6:*:*:*:*:*:*", "matchCriteriaId": "C49C0CA8-485E-4748-A5D5-C3B5FF98381E", "vulnerable": true }, { "criteria": "cpe:2.3:a:hcltech:domino:9.0.1:fixpack_7:*:*:*:*:*:*", "matchCriteriaId": "2C1D2585-833B-4A5A-AAF3-3215C52FE73A", "vulnerable": true }, { "criteria": "cpe:2.3:a:hcltech:domino:9.0.1:fixpack_8:*:*:*:*:*:*", "matchCriteriaId": "AAAE216E-780B-48A7-89D9-6FB8E799B78C", "vulnerable": true }, { "criteria": "cpe:2.3:a:hcltech:domino:9.0.1:fixpack_9:*:*:*:*:*:*", "matchCriteriaId": "A44BBF13-7FCF-4CD9-8EA7-C20CA701B8BA", "vulnerable": true }, { "criteria": "cpe:2.3:a:hcltech:domino:10.0:*:*:*:*:*:*:*", "matchCriteriaId": "908469B9-3B65-400D-A043-6B907B6151EE", "vulnerable": true }, { "criteria": "cpe:2.3:a:hcltech:domino:10.0.1:-:*:*:*:*:*:*", "matchCriteriaId": "EC5EB2B8-9B48-4E9B-9726-71E4A6CCFA99", "vulnerable": true }, { "criteria": "cpe:2.3:a:hcltech:domino:10.0.1:fixpack_1:*:*:*:*:*:*", "matchCriteriaId": "D81AF106-7E8D-4B32-8F63-BD361E2E9508", "vulnerable": true }, { "criteria": "cpe:2.3:a:hcltech:domino:10.0.1:fixpack_2:*:*:*:*:*:*", "matchCriteriaId": "67E40E37-09A5-4BBD-9602-3B72B9A3885F", "vulnerable": true }, { "criteria": "cpe:2.3:a:hcltech:domino:10.0.1:fixpack_3:*:*:*:*:*:*", "matchCriteriaId": "656627F5-4DE4-41FE-9A6E-34D45C6B2639", "vulnerable": true }, { "criteria": "cpe:2.3:a:hcltech:domino:10.0.1:fixpack_4:*:*:*:*:*:*", "matchCriteriaId": "37E5C137-6124-4543-83BC-12BE6BB20309", "vulnerable": true }, { "criteria": "cpe:2.3:a:hcltech:domino:10.0.1:fixpack_5:*:*:*:*:*:*", "matchCriteriaId": "0F7DE084-A236-4ED8-B8A9-EBE2D0ACF580", "vulnerable": true }, { "criteria": "cpe:2.3:a:hcltech:domino:10.0.1:fixpack_6:*:*:*:*:*:*", "matchCriteriaId": "907DF79A-A607-4F3A-9C7E-1FB028B34001", "vulnerable": true }, { "criteria": "cpe:2.3:a:hcltech:domino:10.0.1:fixpack_7:*:*:*:*:*:*", "matchCriteriaId": "9EA72598-85D1-4341-A865-1E6E278F4185", "vulnerable": true }, { "criteria": "cpe:2.3:a:hcltech:domino:10.0.1:fixpack_8:*:*:*:*:*:*", "matchCriteriaId": "0CC3C391-12CB-4DDB-B33E-A2020A738EA2", "vulnerable": true }, { "criteria": "cpe:2.3:a:hcltech:domino:11.0:*:*:*:*:*:*:*", "matchCriteriaId": "9F7B561B-79F9-45E1-901F-B0976DD7C9AE", "vulnerable": true }, { "criteria": "cpe:2.3:a:hcltech:domino:11.0.1:-:*:*:*:*:*:*", "matchCriteriaId": "6D792E4C-170B-4E6E-8808-EFDB3DF42417", "vulnerable": true }, { "criteria": "cpe:2.3:a:hcltech:domino:11.0.1:fixpack_1:*:*:*:*:*:*", "matchCriteriaId": "479BE6F6-9947-4261-8685-E6357ED90CD1", "vulnerable": true }, { "criteria": "cpe:2.3:a:hcltech:domino:11.0.1:fixpack_2:*:*:*:*:*:*", "matchCriteriaId": "C63BD98F-1ADD-494D-B05A-45B86351F0D1", "vulnerable": true }, { "criteria": "cpe:2.3:a:hcltech:domino:11.0.1:fixpack_3:*:*:*:*:*:*", "matchCriteriaId": "51F750D7-3CE2-48CA-8D13-006E9CA3E383", "vulnerable": true }, { "criteria": "cpe:2.3:a:hcltech:domino:11.0.1:fixpack_4:*:*:*:*:*:*", "matchCriteriaId": "93202EFB-89DD-49B1-9E29-77145F6A43F1", "vulnerable": true }, { "criteria": "cpe:2.3:a:hcltech:domino:11.0.1:fixpack_5:*:*:*:*:*:*", "matchCriteriaId": "B65E88C8-173C-40BE-87A3-E3512EBB7C9A", "vulnerable": true }, { "criteria": "cpe:2.3:a:hcltech:domino:12.0:*:*:*:*:*:*:*", "matchCriteriaId": "09FF8200-5500-420F-93DF-7F7708E76300", "vulnerable": true }, { "criteria": "cpe:2.3:a:hcltech:domino:12.0.1:-:*:*:*:*:*:*", "matchCriteriaId": "1A3A3354-D9B3-43CA-8BB1-D9F3E73FD6F4", "vulnerable": true }, { "criteria": "cpe:2.3:a:hcltech:domino:12.0.1:fixpack_1:*:*:*:*:*:*", "matchCriteriaId": "1841C21B-AA17-403F-B054-8C1FF8208173", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "HCL iNotes is susceptible to a link to non-existent domain vulnerability. An attacker could use this vulnerability to trick a user into supplying sensitive information such as username, password, credit card number, etc." }, { "lang": "es", "value": "HCL iNotes es susceptible de una vulnerabilidad de enlace a un dominio no existente. Un atacante podr\u00eda usar esta vulnerabilidad para enga\u00f1ar a un usuario para que proporcione informaci\u00f3n confidencial como el nombre de usuario, la contrase\u00f1a, el n\u00famero de tarjeta de cr\u00e9dito, etc" } ], "id": "CVE-2022-27547", "lastModified": "2024-11-21T06:55:56.800", "metrics": { "cvssMetricV31": [ { "cvssData": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.1, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:N/A:N", "version": "3.1" }, "exploitabilityScore": 1.6, "impactScore": 4.0, "source": "psirt@hcl.com", "type": "Secondary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.4, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:N/A:N", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 4.0, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2022-08-29T16:15:08.507", "references": [ { "source": "psirt@hcl.com", "tags": [ "Vendor Advisory" ], "url": "https://support.hcltechsw.com/csm?id=kb_article\u0026sysparm_article=KB0100212" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://support.hcltechsw.com/csm?id=kb_article\u0026sysparm_article=KB0100212" } ], "sourceIdentifier": "psirt@hcl.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-601" } ], "source": "psirt@hcl.com", "type": "Secondary" }, { "description": [ { "lang": "en", "value": "CWE-601" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Loading…
Loading…
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.