CVE-2022-42909

WEPA Print Away does not verify that a user has authorization to access documents before generating print orders and associated release codes. This could allow an attacker to generate print orders and release codes for documents they don´t own and print hem without authorization. In order to exploit this vulnerability, the user must have an account with wepanow.com or any of the institutions they serve, and be logged in.
Configurations

Configuration 1 (hide)

cpe:2.3:a:wepanow:print_away:-:*:*:*:*:*:*:*

History

21 Nov 2024, 07:25

Type Values Removed Values Added
References () https://enrique.wtf/CVE-2022-42909 - Third Party Advisory () https://enrique.wtf/CVE-2022-42909 - Third Party Advisory
References () https://www.incibe-cert.es/en/early-warning/security-advisories/multiple-vulnerabilities-wepa-print-away - Third Party Advisory () https://www.incibe-cert.es/en/early-warning/security-advisories/multiple-vulnerabilities-wepa-print-away - Third Party Advisory
CVSS v2 : unknown
v3 : 5.4
v2 : unknown
v3 : 6.5

Information

Published : 2023-02-03 19:15

Updated : 2024-11-21 07:25


NVD link : CVE-2022-42909

Mitre link : CVE-2022-42909

CVE.ORG link : CVE-2022-42909


JSON object : View

Products Affected

wepanow

  • print_away
CWE
CWE-79

Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')

CWE-862

Missing Authorization