Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

nvd логотип

CVE-2022-39181

Опубликовано: 17 нояб. 2022
Источник: nvd
CVSS3: 6.1
EPSS Низкий

Описание

GLPI - Reports plugin for GLPI Reflected Cross-Site-Scripting (RXSS). Type 1: Reflected XSS (or Non-Persistent) - The server reads data directly from the HTTP request and reflects it back in the HTTP response. Reflected XSS exploits occur when an attacker causes a victim to supply dangerous content to a vulnerable web application, which is then reflected back to the victim and executed by the web browser. The most common mechanism for delivering malicious content is to include it as a parameter in a URL that is posted publicly or emailed directly to the victim. URLs constructed in this manner constitute the core of many phishing schemes, whereby an attacker convinces a victim to visit a URL that refers to a vulnerable site. After the site reflects the attacker's content back to the victim, the content is executed by the victim's browser.

Уязвимые конфигурации

Конфигурация 1
cpe:2.3:a:glpi-project:reports:-:*:*:*:*:glpi:*:*

EPSS

Процентиль: 27%
0.0009
Низкий

6.1 Medium

CVSS3

Дефекты

CWE-79
CWE-79

Связанные уязвимости

CVSS3: 6.1
redos
11 месяцев назад

Уязвимость glpi-plugin-reports

CVSS3: 6.1
github
больше 2 лет назад

GLPI - Reports plugin for GLPI Reflected Cross-Site-Scripting (RXSS). Type 1: Reflected XSS (or Non-Persistent) - The server reads data directly from the HTTP request and reflects it back in the HTTP response. Reflected XSS exploits occur when an attacker causes a victim to supply dangerous content to a vulnerable web application, which is then reflected back to the victim and executed by the web browser. The most common mechanism for delivering malicious content is to include it as a parameter in a URL that is posted publicly or emailed directly to the victim. URLs constructed in this manner constitute the core of many phishing schemes, whereby an attacker convinces a victim to visit a URL that refers to a vulnerable site. After the site reflects the attacker's content back to the victim, the content is executed by the victim's browser.

CVSS3: 6.1
fstec
больше 2 лет назад

Уязвимость плагина отчетов системы работы с заявками и инцидентами GLPI reports, связанная c неправильной нейтрализацией входных данных во время генерации веб-страницы, используемых в команде SQL, позволяющая нарушителю провести XSS-атаки

EPSS

Процентиль: 27%
0.0009
Низкий

6.1 Medium

CVSS3

Дефекты

CWE-79
CWE-79