An issue was discovered in /DS/LM_API/api/SelectionService/InsertQueryWithActiveRelationsReturnId in Simmeth Lieferantenmanager before 5.6. An attacker can execute JavaScript code in the browser of the victim if a site is loaded. The victim's encrypted password can be stolen and most likely be decrypted.
References
Link | Resource |
---|---|
https://sec-consult.com/vulnerability-lab/advisory/multiple-critical-vulnerabilities-in-simmeth-system-gmbh-lieferantenmanager/ | Exploit Third Party Advisory |
https://sec-consult.com/vulnerability-lab/advisory/multiple-critical-vulnerabilities-in-simmeth-system-gmbh-lieferantenmanager/ | Exploit Third Party Advisory |
Configurations
History
21 Nov 2024, 07:27
Type | Values Removed | Values Added |
---|---|---|
References | () https://sec-consult.com/vulnerability-lab/advisory/multiple-critical-vulnerabilities-in-simmeth-system-gmbh-lieferantenmanager/ - Exploit, Third Party Advisory |
Information
Published : 2022-12-25 05:15
Updated : 2024-11-21 07:27
NVD link : CVE-2022-44012
Mitre link : CVE-2022-44012
CVE.ORG link : CVE-2022-44012
JSON object : View
Products Affected
simmeth
- lieferantenmanager
CWE
CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')