CVE-2022-22798

Sysaid – Pro Plus Edition, SysAid Help Desk Broken Access Control v20.4.74 b10, v22.1.20 b62, v22.1.30 b49 - An attacker needs to log in as a guest after that the system redirects him to the service portal or EndUserPortal.JSP, then he needs to change the path in the URL to /ConcurrentLogin%2ejsp after that he will receive an error message with a login button, by clicking on it, he will connect to the system dashboard. The attacker can receive sensitive data like server details, usernames, workstations, etc. He can also perform actions such as uploading files, deleting calls from the system.
References
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:sysaid:sysaid:*:*:*:*:cloud:*:*:*
cpe:2.3:a:sysaid:sysaid:*:*:*:*:on-premises:*:*:*

History

21 Nov 2024, 06:47

Type Values Removed Values Added
CVSS v2 : 9.0
v3 : 8.8
v2 : 9.0
v3 : 6.8
References () https://www.gov.il/en/departments/faq/cve_advisories - Third Party Advisory () https://www.gov.il/en/departments/faq/cve_advisories - Third Party Advisory

08 Aug 2023, 14:22

Type Values Removed Values Added
CWE CWE-863 NVD-CWE-Other

Information

Published : 2022-05-12 20:15

Updated : 2024-11-21 06:47


NVD link : CVE-2022-22798

Mitre link : CVE-2022-22798

CVE.ORG link : CVE-2022-22798


JSON object : View

Products Affected

sysaid

  • sysaid