Multiple XSS issues were discovered in Sage Enterprise Intelligence 2021 R1.1 that allow an attacker to execute JavaScript code in the context of users' browsers. The attacker needs to be authenticated to reach the vulnerable features. An issue is present in the Notify Users About Modification menu and the Notifications feature. A user can send malicious notifications and execute JavaScript code in the browser of every user who has enabled notifications. This is a stored XSS, and can lead to privilege escalation in the context of the application. (Another issue is present in the Favorites tab. The name of a favorite or a folder of favorites is interpreted as HTML, and can thus embed JavaScript code, which is executed when displayed. This is a self-XSS.)
References
Link | Resource |
---|---|
https://www.synacktiv.com/sites/default/files/2022-12/sage_sei_multiple_xss.pdf | Exploit Technical Description Third Party Advisory |
https://www.synacktiv.com/sites/default/files/2022-12/sage_sei_multiple_xss.pdf | Exploit Technical Description Third Party Advisory |
Configurations
History
21 Nov 2024, 07:09
Type | Values Removed | Values Added |
---|---|---|
Summary |
|
|
References | () https://www.synacktiv.com/sites/default/files/2022-12/sage_sei_multiple_xss.pdf - Exploit, Technical Description, Third Party Advisory |
Information
Published : 2023-01-01 08:15
Updated : 2024-11-21 07:09
NVD link : CVE-2022-34322
Mitre link : CVE-2022-34322
CVE.ORG link : CVE-2022-34322
JSON object : View
Products Affected
sage
- sage_enterprise_intelligence
CWE
CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')