CVE-2022-39813

Italtel NetMatch-S CI 5.2.0-20211008 allows Multiple Reflected/Stored XSS issues under NMSCIWebGui/j_security_check via the j_username parameter, or NMSCIWebGui/actloglineview.jsp via the name or actLine parameter. An attacker leveraging this vulnerability could inject arbitrary JavaScript. The payload would then be triggered every time an authenticated user browses the page containing it.
References
Link Resource
https://www.gruppotim.it/it/footer/red-team.html Exploit Third Party Advisory
https://www.gruppotim.it/it/footer/red-team.html Exploit Third Party Advisory
Configurations

Configuration 1 (hide)

cpe:2.3:a:italtel:netmatch-s_ci:5.2.0-20211008:*:*:*:*:*:*:*

History

21 Nov 2024, 07:18

Type Values Removed Values Added
Summary
  • (es) Italtel NetMatch-S CI 5.2.0-20211008 sufre de múltiples problemas XSS reflejados/almacenados en NMSCIWebGui/j_security_check a través del parámetro j_username, o NMSCIWebGui/actloglineview.jsp a través del parámetro nombre o actLine. Un atacante que aproveche esta vulnerabilidad podría inyectar JavaScript arbitrario. El payload se activará cada vez que un usuario autenticado navegue por la página que la contiene.
References () https://www.gruppotim.it/it/footer/red-team.html - Exploit, Third Party Advisory () https://www.gruppotim.it/it/footer/red-team.html - Exploit, Third Party Advisory

Information

Published : 2023-01-27 22:15

Updated : 2024-11-21 07:18


NVD link : CVE-2022-39813

Mitre link : CVE-2022-39813

CVE.ORG link : CVE-2022-39813


JSON object : View

Products Affected

italtel

  • netmatch-s_ci
CWE
CWE-79

Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')