All the vulnerabilites related to SysAid - SysAid
cve-2015-3000
Vulnerability from cvelistv5
Published
2015-06-08 14:00
Modified
2024-08-06 05:32
Severity ?
EPSS score ?
Summary
SysAid Help Desk before 15.2 allows remote attackers to cause a denial of service (CPU and memory consumption) via a large number of nested entity references in an XML document to (1) /agententry, (2) /rdsmonitoringresponse, or (3) /androidactions, aka an XML Entity Expansion (XEE) attack.
References
▼ | URL | Tags |
---|---|---|
http://seclists.org/fulldisclosure/2015/Jun/8 | mailing-list, x_refsource_FULLDISC | |
http://www.securityfocus.com/archive/1/535679/100/0/threaded | mailing-list, x_refsource_BUGTRAQ | |
http://packetstormsecurity.com/files/132138/SysAid-Help-Desk-14.4-Code-Execution-Denial-Of-Service-Traversal-SQL-Injection.html | x_refsource_MISC | |
http://www.securityfocus.com/bid/75038 | vdb-entry, x_refsource_BID | |
https://www.sysaid.com/blog/entry/sysaid-15-2-your-voice-your-service-desk | x_refsource_CONFIRM |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T05:32:21.283Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "20150603 [Multiple CVE\u0027s]: various critical vulnerabilities in SysAid Help Desk (RCE, file download, DoS, etc)", "tags": [ "mailing-list", "x_refsource_FULLDISC", "x_transferred" ], "url": "http://seclists.org/fulldisclosure/2015/Jun/8" }, { "name": "20150603 [Multiple CVE\u0027s]: various critical vulnerabilities in SysAid Help Desk (RCE, file download, DoS, etc)", "tags": [ "mailing-list", "x_refsource_BUGTRAQ", "x_transferred" ], "url": "http://www.securityfocus.com/archive/1/535679/100/0/threaded" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://packetstormsecurity.com/files/132138/SysAid-Help-Desk-14.4-Code-Execution-Denial-Of-Service-Traversal-SQL-Injection.html" }, { "name": "75038", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/75038" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://www.sysaid.com/blog/entry/sysaid-15-2-your-voice-your-service-desk" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2015-06-03T00:00:00", "descriptions": [ { "lang": "en", "value": "SysAid Help Desk before 15.2 allows remote attackers to cause a denial of service (CPU and memory consumption) via a large number of nested entity references in an XML document to (1) /agententry, (2) /rdsmonitoringresponse, or (3) /androidactions, aka an XML Entity Expansion (XEE) attack." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2018-10-09T18:57:01", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "name": "20150603 [Multiple CVE\u0027s]: various critical vulnerabilities in SysAid Help Desk (RCE, file download, DoS, etc)", "tags": [ "mailing-list", "x_refsource_FULLDISC" ], "url": "http://seclists.org/fulldisclosure/2015/Jun/8" }, { "name": "20150603 [Multiple CVE\u0027s]: various critical vulnerabilities in SysAid Help Desk (RCE, file download, DoS, etc)", "tags": [ "mailing-list", "x_refsource_BUGTRAQ" ], "url": "http://www.securityfocus.com/archive/1/535679/100/0/threaded" }, { "tags": [ "x_refsource_MISC" ], "url": "http://packetstormsecurity.com/files/132138/SysAid-Help-Desk-14.4-Code-Execution-Denial-Of-Service-Traversal-SQL-Injection.html" }, { "name": "75038", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/75038" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://www.sysaid.com/blog/entry/sysaid-15-2-your-voice-your-service-desk" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2015-3000", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "SysAid Help Desk before 15.2 allows remote attackers to cause a denial of service (CPU and memory consumption) via a large number of nested entity references in an XML document to (1) /agententry, (2) /rdsmonitoringresponse, or (3) /androidactions, aka an XML Entity Expansion (XEE) attack." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "20150603 [Multiple CVE\u0027s]: various critical vulnerabilities in SysAid Help Desk (RCE, file download, DoS, etc)", "refsource": "FULLDISC", "url": "http://seclists.org/fulldisclosure/2015/Jun/8" }, { "name": "20150603 [Multiple CVE\u0027s]: various critical vulnerabilities in SysAid Help Desk (RCE, file download, DoS, etc)", "refsource": "BUGTRAQ", "url": "http://www.securityfocus.com/archive/1/535679/100/0/threaded" }, { "name": "http://packetstormsecurity.com/files/132138/SysAid-Help-Desk-14.4-Code-Execution-Denial-Of-Service-Traversal-SQL-Injection.html", "refsource": "MISC", "url": "http://packetstormsecurity.com/files/132138/SysAid-Help-Desk-14.4-Code-Execution-Denial-Of-Service-Traversal-SQL-Injection.html" }, { "name": "75038", "refsource": "BID", "url": "http://www.securityfocus.com/bid/75038" }, { "name": "https://www.sysaid.com/blog/entry/sysaid-15-2-your-voice-your-service-desk", "refsource": "CONFIRM", "url": "https://www.sysaid.com/blog/entry/sysaid-15-2-your-voice-your-service-desk" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2015-3000", "datePublished": "2015-06-08T14:00:00", "dateReserved": "2015-04-07T00:00:00", "dateUpdated": "2024-08-06T05:32:21.283Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2015-2993
Vulnerability from cvelistv5
Published
2015-06-08 14:00
Modified
2024-08-06 05:32
Severity ?
EPSS score ?
Summary
SysAid Help Desk before 15.2 does not properly restrict access to certain functionality, which allows remote attackers to (1) create administrator accounts via a crafted request to /createnewaccount or (2) write to arbitrary files via the fileName parameter to /userentry.
References
▼ | URL | Tags |
---|---|---|
http://seclists.org/fulldisclosure/2015/Jun/8 | mailing-list, x_refsource_FULLDISC | |
http://www.securityfocus.com/archive/1/535679/100/0/threaded | mailing-list, x_refsource_BUGTRAQ | |
http://packetstormsecurity.com/files/132138/SysAid-Help-Desk-14.4-Code-Execution-Denial-Of-Service-Traversal-SQL-Injection.html | x_refsource_MISC | |
http://www.securityfocus.com/bid/75038 | vdb-entry, x_refsource_BID | |
https://www.sysaid.com/blog/entry/sysaid-15-2-your-voice-your-service-desk | x_refsource_CONFIRM |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T05:32:21.357Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "20150603 [Multiple CVE\u0027s]: various critical vulnerabilities in SysAid Help Desk (RCE, file download, DoS, etc)", "tags": [ "mailing-list", "x_refsource_FULLDISC", "x_transferred" ], "url": "http://seclists.org/fulldisclosure/2015/Jun/8" }, { "name": "20150603 [Multiple CVE\u0027s]: various critical vulnerabilities in SysAid Help Desk (RCE, file download, DoS, etc)", "tags": [ "mailing-list", "x_refsource_BUGTRAQ", "x_transferred" ], "url": "http://www.securityfocus.com/archive/1/535679/100/0/threaded" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://packetstormsecurity.com/files/132138/SysAid-Help-Desk-14.4-Code-Execution-Denial-Of-Service-Traversal-SQL-Injection.html" }, { "name": "75038", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/75038" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://www.sysaid.com/blog/entry/sysaid-15-2-your-voice-your-service-desk" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2015-06-03T00:00:00", "descriptions": [ { "lang": "en", "value": "SysAid Help Desk before 15.2 does not properly restrict access to certain functionality, which allows remote attackers to (1) create administrator accounts via a crafted request to /createnewaccount or (2) write to arbitrary files via the fileName parameter to /userentry." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2018-10-09T18:57:01", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "name": "20150603 [Multiple CVE\u0027s]: various critical vulnerabilities in SysAid Help Desk (RCE, file download, DoS, etc)", "tags": [ "mailing-list", "x_refsource_FULLDISC" ], "url": "http://seclists.org/fulldisclosure/2015/Jun/8" }, { "name": "20150603 [Multiple CVE\u0027s]: various critical vulnerabilities in SysAid Help Desk (RCE, file download, DoS, etc)", "tags": [ "mailing-list", "x_refsource_BUGTRAQ" ], "url": "http://www.securityfocus.com/archive/1/535679/100/0/threaded" }, { "tags": [ "x_refsource_MISC" ], "url": "http://packetstormsecurity.com/files/132138/SysAid-Help-Desk-14.4-Code-Execution-Denial-Of-Service-Traversal-SQL-Injection.html" }, { "name": "75038", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/75038" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://www.sysaid.com/blog/entry/sysaid-15-2-your-voice-your-service-desk" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2015-2993", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "SysAid Help Desk before 15.2 does not properly restrict access to certain functionality, which allows remote attackers to (1) create administrator accounts via a crafted request to /createnewaccount or (2) write to arbitrary files via the fileName parameter to /userentry." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "20150603 [Multiple CVE\u0027s]: various critical vulnerabilities in SysAid Help Desk (RCE, file download, DoS, etc)", "refsource": "FULLDISC", "url": "http://seclists.org/fulldisclosure/2015/Jun/8" }, { "name": "20150603 [Multiple CVE\u0027s]: various critical vulnerabilities in SysAid Help Desk (RCE, file download, DoS, etc)", "refsource": "BUGTRAQ", "url": "http://www.securityfocus.com/archive/1/535679/100/0/threaded" }, { "name": "http://packetstormsecurity.com/files/132138/SysAid-Help-Desk-14.4-Code-Execution-Denial-Of-Service-Traversal-SQL-Injection.html", "refsource": "MISC", "url": "http://packetstormsecurity.com/files/132138/SysAid-Help-Desk-14.4-Code-Execution-Denial-Of-Service-Traversal-SQL-Injection.html" }, { "name": "75038", "refsource": "BID", "url": "http://www.securityfocus.com/bid/75038" }, { "name": "https://www.sysaid.com/blog/entry/sysaid-15-2-your-voice-your-service-desk", "refsource": "CONFIRM", "url": "https://www.sysaid.com/blog/entry/sysaid-15-2-your-voice-your-service-desk" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2015-2993", "datePublished": "2015-06-08T14:00:00", "dateReserved": "2015-04-07T00:00:00", "dateUpdated": "2024-08-06T05:32:21.357Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-43973
Vulnerability from cvelistv5
Published
2022-01-11 19:20
Modified
2024-08-04 04:10
Severity ?
EPSS score ?
Summary
An unrestricted file upload vulnerability in /UploadPsIcon.jsp in SysAid ITIL 20.4.74 b10 allows a remote authenticated attacker to upload an arbitrary file via the file parameter in the HTTP POST body. A successful request returns the absolute, server-side filesystem path of the uploaded file.
References
▼ | URL | Tags |
---|---|---|
https://www.sysaid.com/it-service-management-software/incident-management | x_refsource_MISC | |
https://github.com/atredispartners/advisories/blob/master/ATREDIS-2021-0002.md | x_refsource_MISC | |
https://github.com/atredispartners/advisories/blob/master/ATREDIS-2022-0001.md | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T04:10:17.149Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://www.sysaid.com/it-service-management-software/incident-management" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://github.com/atredispartners/advisories/blob/master/ATREDIS-2021-0002.md" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://github.com/atredispartners/advisories/blob/master/ATREDIS-2022-0001.md" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "descriptions": [ { "lang": "en", "value": "An unrestricted file upload vulnerability in /UploadPsIcon.jsp in SysAid ITIL 20.4.74 b10 allows a remote authenticated attacker to upload an arbitrary file via the file parameter in the HTTP POST body. A successful request returns the absolute, server-side filesystem path of the uploaded file." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2022-01-11T19:20:43", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://www.sysaid.com/it-service-management-software/incident-management" }, { "tags": [ "x_refsource_MISC" ], "url": "https://github.com/atredispartners/advisories/blob/master/ATREDIS-2021-0002.md" }, { "tags": [ "x_refsource_MISC" ], "url": "https://github.com/atredispartners/advisories/blob/master/ATREDIS-2022-0001.md" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2021-43973", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "An unrestricted file upload vulnerability in /UploadPsIcon.jsp in SysAid ITIL 20.4.74 b10 allows a remote authenticated attacker to upload an arbitrary file via the file parameter in the HTTP POST body. A successful request returns the absolute, server-side filesystem path of the uploaded file." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "https://www.sysaid.com/it-service-management-software/incident-management", "refsource": "MISC", "url": "https://www.sysaid.com/it-service-management-software/incident-management" }, { "name": "https://github.com/atredispartners/advisories/blob/master/ATREDIS-2021-0002.md", "refsource": "MISC", "url": "https://github.com/atredispartners/advisories/blob/master/ATREDIS-2021-0002.md" }, { "name": "https://github.com/atredispartners/advisories/blob/master/ATREDIS-2022-0001.md", "refsource": "MISC", "url": "https://github.com/atredispartners/advisories/blob/master/ATREDIS-2022-0001.md" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2021-43973", "datePublished": "2022-01-11T19:20:43", "dateReserved": "2021-11-17T00:00:00", "dateUpdated": "2024-08-04T04:10:17.149Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2015-3001
Vulnerability from cvelistv5
Published
2015-06-08 14:00
Modified
2024-08-06 05:32
Severity ?
EPSS score ?
Summary
SysAid Help Desk before 15.2 uses a hardcoded password of Password1 for the sa SQL Server Express user account, which allows remote authenticated users to bypass intended access restrictions by leveraging knowledge of this password.
References
▼ | URL | Tags |
---|---|---|
http://seclists.org/fulldisclosure/2015/Jun/8 | mailing-list, x_refsource_FULLDISC | |
http://www.securityfocus.com/archive/1/535679/100/0/threaded | mailing-list, x_refsource_BUGTRAQ | |
http://www.securityfocus.com/bid/75035 | vdb-entry, x_refsource_BID | |
http://packetstormsecurity.com/files/132138/SysAid-Help-Desk-14.4-Code-Execution-Denial-Of-Service-Traversal-SQL-Injection.html | x_refsource_MISC | |
https://www.sysaid.com/blog/entry/sysaid-15-2-your-voice-your-service-desk | x_refsource_CONFIRM |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T05:32:21.172Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "20150603 [Multiple CVE\u0027s]: various critical vulnerabilities in SysAid Help Desk (RCE, file download, DoS, etc)", "tags": [ "mailing-list", "x_refsource_FULLDISC", "x_transferred" ], "url": "http://seclists.org/fulldisclosure/2015/Jun/8" }, { "name": "20150603 [Multiple CVE\u0027s]: various critical vulnerabilities in SysAid Help Desk (RCE, file download, DoS, etc)", "tags": [ "mailing-list", "x_refsource_BUGTRAQ", "x_transferred" ], "url": "http://www.securityfocus.com/archive/1/535679/100/0/threaded" }, { "name": "75035", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/75035" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://packetstormsecurity.com/files/132138/SysAid-Help-Desk-14.4-Code-Execution-Denial-Of-Service-Traversal-SQL-Injection.html" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://www.sysaid.com/blog/entry/sysaid-15-2-your-voice-your-service-desk" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2015-06-03T00:00:00", "descriptions": [ { "lang": "en", "value": "SysAid Help Desk before 15.2 uses a hardcoded password of Password1 for the sa SQL Server Express user account, which allows remote authenticated users to bypass intended access restrictions by leveraging knowledge of this password." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2018-10-09T18:57:01", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "name": "20150603 [Multiple CVE\u0027s]: various critical vulnerabilities in SysAid Help Desk (RCE, file download, DoS, etc)", "tags": [ "mailing-list", "x_refsource_FULLDISC" ], "url": "http://seclists.org/fulldisclosure/2015/Jun/8" }, { "name": "20150603 [Multiple CVE\u0027s]: various critical vulnerabilities in SysAid Help Desk (RCE, file download, DoS, etc)", "tags": [ "mailing-list", "x_refsource_BUGTRAQ" ], "url": "http://www.securityfocus.com/archive/1/535679/100/0/threaded" }, { "name": "75035", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/75035" }, { "tags": [ "x_refsource_MISC" ], "url": "http://packetstormsecurity.com/files/132138/SysAid-Help-Desk-14.4-Code-Execution-Denial-Of-Service-Traversal-SQL-Injection.html" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://www.sysaid.com/blog/entry/sysaid-15-2-your-voice-your-service-desk" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2015-3001", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "SysAid Help Desk before 15.2 uses a hardcoded password of Password1 for the sa SQL Server Express user account, which allows remote authenticated users to bypass intended access restrictions by leveraging knowledge of this password." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "20150603 [Multiple CVE\u0027s]: various critical vulnerabilities in SysAid Help Desk (RCE, file download, DoS, etc)", "refsource": "FULLDISC", "url": "http://seclists.org/fulldisclosure/2015/Jun/8" }, { "name": "20150603 [Multiple CVE\u0027s]: various critical vulnerabilities in SysAid Help Desk (RCE, file download, DoS, etc)", "refsource": "BUGTRAQ", "url": "http://www.securityfocus.com/archive/1/535679/100/0/threaded" }, { "name": "75035", "refsource": "BID", "url": "http://www.securityfocus.com/bid/75035" }, { "name": "http://packetstormsecurity.com/files/132138/SysAid-Help-Desk-14.4-Code-Execution-Denial-Of-Service-Traversal-SQL-Injection.html", "refsource": "MISC", "url": "http://packetstormsecurity.com/files/132138/SysAid-Help-Desk-14.4-Code-Execution-Denial-Of-Service-Traversal-SQL-Injection.html" }, { "name": "https://www.sysaid.com/blog/entry/sysaid-15-2-your-voice-your-service-desk", "refsource": "CONFIRM", "url": "https://www.sysaid.com/blog/entry/sysaid-15-2-your-voice-your-service-desk" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2015-3001", "datePublished": "2015-06-08T14:00:00", "dateReserved": "2015-04-07T00:00:00", "dateUpdated": "2024-08-06T05:32:21.172Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-47247
Vulnerability from cvelistv5
Published
2023-12-25 00:00
Modified
2024-08-02 21:09
Severity ?
EPSS score ?
Summary
In SysAid On-Premise before 23.3.34, there is an edge case in which an end user is able to delete a Knowledge Base article, aka bug 15102.
References
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T21:09:35.903Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://documentation.sysaid.com/docs/23334" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "descriptions": [ { "lang": "en", "value": "In SysAid On-Premise before 23.3.34, there is an edge case in which an end user is able to delete a Knowledge Base article, aka bug 15102." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2023-12-25T06:19:10.695118", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "url": "https://documentation.sysaid.com/docs/23334" } ] } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2023-47247", "datePublished": "2023-12-25T00:00:00", "dateReserved": "2023-11-04T00:00:00", "dateUpdated": "2024-08-02T21:09:35.903Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-32225
Vulnerability from cvelistv5
Published
2023-07-30 07:16
Modified
2024-10-21 17:53
Severity ?
EPSS score ?
Summary
Sysaid - CWE-434: Unrestricted Upload of File with Dangerous Type
References
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T15:10:23.902Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://www.gov.il/en/Departments/faq/cve_advisories" } ], "title": "CVE Program Container" }, { "metrics": [ { "other": { "content": { "id": "CVE-2023-32225", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-10-21T17:53:01.794733Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-10-21T17:53:17.063Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "Sysaid", "vendor": "Sysaid", "versions": [ { "lessThan": "23.2.14 b18", "status": "affected", "version": "All versions", "versionType": "custom" } ] } ], "credits": [ { "lang": "en", "type": "finder", "user": "00000000-0000-4000-9000-000000000000", "value": "Niv Levy" } ], "datePublic": "2023-07-30T06:54:00.000Z", "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": " Sysaid - CWE-434: Unrestricted Upload of File with Dangerous Type -\u0026nbsp;\n\n\u003cspan style=\"background-color: rgb(255, 255, 255);\"\u003eA malicious user with administrative privileges may be able to upload a dangerous filetype via an unspecified method.\u003c/span\u003e\n\n" } ], "value": " Sysaid - CWE-434: Unrestricted Upload of File with Dangerous Type -\u00a0\n\nA malicious user with administrative privileges may be able to upload a dangerous filetype via an unspecified method.\n\n" } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-434", "description": "CWE-434 Unrestricted Upload of File with Dangerous Type", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2023-07-30T07:16:24.730Z", "orgId": "a57ee1ae-c9c1-4f40-aa7b-cf10760fde3f", "shortName": "INCD" }, "references": [ { "url": "https://www.gov.il/en/Departments/faq/cve_advisories" } ], "solutions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "\n\n\u003cspan style=\"background-color: rgb(255, 255, 255);\"\u003eUpdate to version 23.2.14 b18 (On-Prem). \u003c/span\u003e\n\n\u003cbr\u003e" } ], "value": "\nUpdate to version 23.2.14 b18 (On-Prem). \n\n\n" } ], "source": { "advisory": "ILVN-2023-0112", "discovery": "UNKNOWN" }, "title": " Sysaid - CWE-434: Unrestricted Upload of File with Dangerous Type", "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "a57ee1ae-c9c1-4f40-aa7b-cf10760fde3f", "assignerShortName": "INCD", "cveId": "CVE-2023-32225", "datePublished": "2023-07-30T07:16:24.730Z", "dateReserved": "2023-05-04T20:53:11.224Z", "dateUpdated": "2024-10-21T17:53:17.063Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2015-2994
Vulnerability from cvelistv5
Published
2015-06-08 14:00
Modified
2024-08-06 05:32
Severity ?
EPSS score ?
Summary
Unrestricted file upload vulnerability in ChangePhoto.jsp in SysAid Help Desk before 15.2 allows remote administrators to execute arbitrary code by uploading a file with a .jsp extension, then accessing it via a direct request to the file in icons/user_photo/.
References
▼ | URL | Tags |
---|---|---|
http://seclists.org/fulldisclosure/2015/Jun/8 | mailing-list, x_refsource_FULLDISC | |
http://www.securityfocus.com/archive/1/535679/100/0/threaded | mailing-list, x_refsource_BUGTRAQ | |
http://packetstormsecurity.com/files/132138/SysAid-Help-Desk-14.4-Code-Execution-Denial-Of-Service-Traversal-SQL-Injection.html | x_refsource_MISC | |
http://www.securityfocus.com/bid/75038 | vdb-entry, x_refsource_BID | |
https://www.sysaid.com/blog/entry/sysaid-15-2-your-voice-your-service-desk | x_refsource_CONFIRM |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T05:32:21.121Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "20150603 [Multiple CVE\u0027s]: various critical vulnerabilities in SysAid Help Desk (RCE, file download, DoS, etc)", "tags": [ "mailing-list", "x_refsource_FULLDISC", "x_transferred" ], "url": "http://seclists.org/fulldisclosure/2015/Jun/8" }, { "name": "20150603 [Multiple CVE\u0027s]: various critical vulnerabilities in SysAid Help Desk (RCE, file download, DoS, etc)", "tags": [ "mailing-list", "x_refsource_BUGTRAQ", "x_transferred" ], "url": "http://www.securityfocus.com/archive/1/535679/100/0/threaded" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://packetstormsecurity.com/files/132138/SysAid-Help-Desk-14.4-Code-Execution-Denial-Of-Service-Traversal-SQL-Injection.html" }, { "name": "75038", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/75038" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://www.sysaid.com/blog/entry/sysaid-15-2-your-voice-your-service-desk" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2015-06-03T00:00:00", "descriptions": [ { "lang": "en", "value": "Unrestricted file upload vulnerability in ChangePhoto.jsp in SysAid Help Desk before 15.2 allows remote administrators to execute arbitrary code by uploading a file with a .jsp extension, then accessing it via a direct request to the file in icons/user_photo/." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2018-10-09T18:57:01", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "name": "20150603 [Multiple CVE\u0027s]: various critical vulnerabilities in SysAid Help Desk (RCE, file download, DoS, etc)", "tags": [ "mailing-list", "x_refsource_FULLDISC" ], "url": "http://seclists.org/fulldisclosure/2015/Jun/8" }, { "name": "20150603 [Multiple CVE\u0027s]: various critical vulnerabilities in SysAid Help Desk (RCE, file download, DoS, etc)", "tags": [ "mailing-list", "x_refsource_BUGTRAQ" ], "url": "http://www.securityfocus.com/archive/1/535679/100/0/threaded" }, { "tags": [ "x_refsource_MISC" ], "url": "http://packetstormsecurity.com/files/132138/SysAid-Help-Desk-14.4-Code-Execution-Denial-Of-Service-Traversal-SQL-Injection.html" }, { "name": "75038", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/75038" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://www.sysaid.com/blog/entry/sysaid-15-2-your-voice-your-service-desk" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2015-2994", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Unrestricted file upload vulnerability in ChangePhoto.jsp in SysAid Help Desk before 15.2 allows remote administrators to execute arbitrary code by uploading a file with a .jsp extension, then accessing it via a direct request to the file in icons/user_photo/." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "20150603 [Multiple CVE\u0027s]: various critical vulnerabilities in SysAid Help Desk (RCE, file download, DoS, etc)", "refsource": "FULLDISC", "url": "http://seclists.org/fulldisclosure/2015/Jun/8" }, { "name": "20150603 [Multiple CVE\u0027s]: various critical vulnerabilities in SysAid Help Desk (RCE, file download, DoS, etc)", "refsource": "BUGTRAQ", "url": "http://www.securityfocus.com/archive/1/535679/100/0/threaded" }, { "name": "http://packetstormsecurity.com/files/132138/SysAid-Help-Desk-14.4-Code-Execution-Denial-Of-Service-Traversal-SQL-Injection.html", "refsource": "MISC", "url": "http://packetstormsecurity.com/files/132138/SysAid-Help-Desk-14.4-Code-Execution-Denial-Of-Service-Traversal-SQL-Injection.html" }, { "name": "75038", "refsource": "BID", "url": "http://www.securityfocus.com/bid/75038" }, { "name": "https://www.sysaid.com/blog/entry/sysaid-15-2-your-voice-your-service-desk", "refsource": "CONFIRM", "url": "https://www.sysaid.com/blog/entry/sysaid-15-2-your-voice-your-service-desk" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2015-2994", "datePublished": "2015-06-08T14:00:00", "dateReserved": "2015-04-07T00:00:00", "dateUpdated": "2024-08-06T05:32:21.121Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2024-36393
Vulnerability from cvelistv5
Published
2024-06-06 08:18
Modified
2024-08-02 03:37
Severity ?
EPSS score ?
Summary
SysAid - CWE-89: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')
References
{ "containers": { "adp": [ { "affected": [ { "cpes": [ "cpe:2.3:a:sysaid:sysaid:23.3.38:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "sysaid", "vendor": "sysaid", "versions": [ { "status": "affected", "version": "23.3.38" } ] } ], "metrics": [ { "other": { "content": { "id": "CVE-2024-36393", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "total" } ], "role": "CISA Coordinator", "timestamp": "2024-06-06T13:23:19.567575Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-06-06T13:24:30.117Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" }, { "providerMetadata": { "dateUpdated": "2024-08-02T03:37:04.931Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://www.gov.il/en/Departments/faq/cve_advisories" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "SysAid", "vendor": "Sysaid", "versions": [ { "lessThanOrEqual": "23.3.38", "status": "affected", "version": "All versions", "versionType": "custom" } ] } ], "credits": [ { "lang": "en", "type": "finder", "value": "Niv Levy, Daniel Shemesh, Or Ida - CyberArk" } ], "datePublic": "2024-06-06T08:16:00.000Z", "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "\n\n\u003cspan style=\"background-color: rgb(255, 255, 255);\"\u003eSysAid - CWE-89: Improper Neutralization of Special Elements used in an SQL Command (\u0027SQL Injection\u0027)\u003c/span\u003e\n\n" } ], "value": "SysAid - CWE-89: Improper Neutralization of Special Elements used in an SQL Command (\u0027SQL Injection\u0027)" } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.9, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-89", "description": "CWE-89 Improper Neutralization of Special Elements used in an SQL Command (\u0027SQL Injection\u0027)", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-06-06T08:18:52.667Z", "orgId": "a57ee1ae-c9c1-4f40-aa7b-cf10760fde3f", "shortName": "INCD" }, "references": [ { "url": "https://www.gov.il/en/Departments/faq/cve_advisories" } ], "solutions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "\n\n\u003cspan style=\"background-color: rgb(255, 255, 255);\"\u003eUpgrade to version 23.3.38 build 19. Apply configuration changes per \u003c/span\u003e\u003ca target=\"_blank\" rel=\"nofollow\" href=\"https://mcas-proxyweb.mcas.ms/certificate-checker?login=false\u0026amp;originalUrl=https%3A%2F%2Fdocumentation.sysaid.com.mcas.ms%2Fclassic%2Fdocs%2Fsql-sanitizer%3FMcasTsid%3D20893\u0026amp;McasCSRF=e0e2a7c3f95245a60a284c116b19a6e86983b35f3ff1e6c7f840f9bf82646ee5\"\u003ehttps://documentation.sysaid.com/classic/docs/sql-sanitizer\u003c/a\u003e\n\n\u003cbr\u003e" } ], "value": "Upgrade to version 23.3.38 build 19. Apply configuration changes per https://documentation.sysaid.com/classic/docs/sql-sanitizer https://mcas-proxyweb.mcas.ms/certificate-checker" } ], "source": { "advisory": "ILVN-2024-0162", "discovery": "UNKNOWN" }, "title": "SysAid - CWE-89: Improper Neutralization of Special Elements used in an SQL Command (\u0027SQL Injection\u0027)", "x_generator": { "engine": "Vulnogram 0.2.0" } } }, "cveMetadata": { "assignerOrgId": "a57ee1ae-c9c1-4f40-aa7b-cf10760fde3f", "assignerShortName": "INCD", "cveId": "CVE-2024-36393", "datePublished": "2024-06-06T08:18:52.667Z", "dateReserved": "2024-05-27T13:04:44.111Z", "dateUpdated": "2024-08-02T03:37:04.931Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2024-36394
Vulnerability from cvelistv5
Published
2024-06-06 08:20
Modified
2024-08-02 03:37
Severity ?
EPSS score ?
Summary
SysAid - CWE-78: Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
References
{ "containers": { "adp": [ { "affected": [ { "cpes": [ "cpe:2.3:a:sysaid:sysaid:23.3.38:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "sysaid", "vendor": "sysaid", "versions": [ { "lessThanOrEqual": "23.3.38", "status": "affected", "version": "0", "versionType": "custom" } ] } ], "metrics": [ { "other": { "content": { "id": "CVE-2024-36394", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "total" } ], "role": "CISA Coordinator", "timestamp": "2024-06-06T12:56:00.362302Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-06-06T13:05:49.693Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" }, { "providerMetadata": { "dateUpdated": "2024-08-02T03:37:05.138Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://www.gov.il/en/Departments/faq/cve_advisories" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "SysAid", "vendor": "Sysaid", "versions": [ { "lessThanOrEqual": "23.3.38", "status": "affected", "version": "All versions", "versionType": "custom" } ] } ], "credits": [ { "lang": "en", "type": "finder", "value": "Niv Levy, Daniel Shemesh, Or Ida - CyberArk" } ], "datePublic": "2024-06-06T08:16:00.000Z", "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "\n\n\u003ctable\u003e\u003ctbody\u003e\u003ctr\u003e\u003ctd\u003e\u003cp\u003eSysAid - CWE-78: Improper Neutralization of Special Elements used in an OS Command (\u0027OS Command Injection\u0027)\u003c/p\u003e\u003c/td\u003e\u003c/tr\u003e\u003c/tbody\u003e\u003c/table\u003e\n\n" } ], "value": "SysAid - CWE-78: Improper Neutralization of Special Elements used in an OS Command (\u0027OS Command Injection\u0027)" } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.1, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "HIGH", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-78", "description": "CWE-78 Improper Neutralization of Special Elements used in an OS Command (\u0027OS Command Injection\u0027)", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-06-06T08:20:04.781Z", "orgId": "a57ee1ae-c9c1-4f40-aa7b-cf10760fde3f", "shortName": "INCD" }, "references": [ { "url": "https://www.gov.il/en/Departments/faq/cve_advisories" } ], "solutions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "\n\n\u003cspan style=\"background-color: rgb(255, 255, 255);\"\u003eUpgrade to version 23.3.38 build 19. Apply configuration changes per \u003c/span\u003e\u003ca target=\"_blank\" rel=\"nofollow\" href=\"https://mcas-proxyweb.mcas.ms/certificate-checker?login=false\u0026amp;originalUrl=https%3A%2F%2Fdocumentation.sysaid.com.mcas.ms%2Fclassic%2Fdocs%2Fsql-sanitizer%3FMcasTsid%3D20893\u0026amp;McasCSRF=e0e2a7c3f95245a60a284c116b19a6e86983b35f3ff1e6c7f840f9bf82646ee5\"\u003ehttps://documentation.sysaid.com/classic/docs/sql-sanitizer\u003c/a\u003e\n\n\u003cbr\u003e" } ], "value": "Upgrade to version 23.3.38 build 19. Apply configuration changes per https://documentation.sysaid.com/classic/docs/sql-sanitizer https://mcas-proxyweb.mcas.ms/certificate-checker" } ], "source": { "advisory": "ILVN-2024-0163", "discovery": "UNKNOWN" }, "title": "SysAid - CWE-78: Improper Neutralization of Special Elements used in an OS Command (\u0027OS Command Injection\u0027)", "x_generator": { "engine": "Vulnogram 0.2.0" } } }, "cveMetadata": { "assignerOrgId": "a57ee1ae-c9c1-4f40-aa7b-cf10760fde3f", "assignerShortName": "INCD", "cveId": "CVE-2024-36394", "datePublished": "2024-06-06T08:20:04.781Z", "dateReserved": "2024-05-27T13:04:44.111Z", "dateUpdated": "2024-08-02T03:37:05.138Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2022-22798
Vulnerability from cvelistv5
Published
2022-05-12 19:48
Modified
2024-09-17 02:47
Severity ?
EPSS score ?
Summary
Sysaid – Pro Plus Edition, SysAid Help Desk Broken Access Control
References
▼ | URL | Tags |
---|---|---|
https://www.gov.il/en/departments/faq/cve_advisories | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T03:21:49.115Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://www.gov.il/en/departments/faq/cve_advisories" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "platforms": [ "cloud" ], "product": "Sysaid", "vendor": "SysAid", "versions": [ { "lessThanOrEqual": "22.1.49", "status": "affected", "version": "22.1.49 cloud version", "versionType": "custom" } ] }, { "platforms": [ "on premise" ], "product": "Sysaid", "vendor": "SysAid", "versions": [ { "lessThanOrEqual": "22.1.63", "status": "affected", "version": "22.1.63 on premise version", "versionType": "custom" } ] } ], "credits": [ { "lang": "en", "value": "Gad Abuhatzeira, Alon Zuker - Sophtix Security LTD" } ], "datePublic": "2022-05-09T00:00:00", "descriptions": [ { "lang": "en", "value": "Sysaid \u2013 Pro Plus Edition, SysAid Help Desk Broken Access Control v20.4.74 b10, v22.1.20 b62, v22.1.30 b49 - An attacker needs to log in as a guest after that the system redirects him to the service portal or EndUserPortal.JSP, then he needs to change the path in the URL to /ConcurrentLogin%2ejsp after that he will receive an error message with a login button, by clicking on it, he will connect to the system dashboard. The attacker can receive sensitive data like server details, usernames, workstations, etc. He can also perform actions such as uploading files, deleting calls from the system." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "LOW", "baseScore": 6.8, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:L", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "description": "Broken Access Control", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2022-05-12T19:48:42", "orgId": "a57ee1ae-c9c1-4f40-aa7b-cf10760fde3f", "shortName": "INCD" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://www.gov.il/en/departments/faq/cve_advisories" } ], "solutions": [ { "lang": "en", "value": "Update to 22.1.50 cloud version, or to 22.1.64 on premise version." } ], "source": { "defect": [ "ILVN-2022-0019" ], "discovery": "EXTERNAL" }, "title": "Sysaid \u2013 Pro Plus Edition, SysAid Help Desk Broken Access Control", "x_generator": { "engine": "Vulnogram 0.0.9" }, "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cna@cyber.gov.il", "DATE_PUBLIC": "2022-05-09T11:39:00.000Z", "ID": "CVE-2022-22798", "STATE": "PUBLIC", "TITLE": "Sysaid \u2013 Pro Plus Edition, SysAid Help Desk Broken Access Control" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Sysaid", "version": { "version_data": [ { "platform": "cloud", "version_affected": "\u003c=", "version_name": "22.1.49 cloud version", "version_value": "22.1.49" }, { "platform": "on premise", "version_affected": "\u003c=", "version_name": "22.1.63 on premise version", "version_value": "22.1.63" } ] } } ] }, "vendor_name": "SysAid" } ] } }, "credit": [ { "lang": "eng", "value": "Gad Abuhatzeira, Alon Zuker - Sophtix Security LTD" } ], "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Sysaid \u2013 Pro Plus Edition, SysAid Help Desk Broken Access Control v20.4.74 b10, v22.1.20 b62, v22.1.30 b49 - An attacker needs to log in as a guest after that the system redirects him to the service portal or EndUserPortal.JSP, then he needs to change the path in the URL to /ConcurrentLogin%2ejsp after that he will receive an error message with a login button, by clicking on it, he will connect to the system dashboard. The attacker can receive sensitive data like server details, usernames, workstations, etc. He can also perform actions such as uploading files, deleting calls from the system." } ] }, "generator": { "engine": "Vulnogram 0.0.9" }, "impact": { "cvss": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "LOW", "baseScore": 6.8, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:L", "version": "3.1" } }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Broken Access Control" } ] } ] }, "references": { "reference_data": [ { "name": "https://www.gov.il/en/departments/faq/cve_advisories", "refsource": "MISC", "url": "https://www.gov.il/en/departments/faq/cve_advisories" } ] }, "solution": [ { "lang": "en", "value": "Update to 22.1.50 cloud version, or to 22.1.64 on premise version." } ], "source": { "defect": [ "ILVN-2022-0019" ], "discovery": "EXTERNAL" } } } }, "cveMetadata": { "assignerOrgId": "a57ee1ae-c9c1-4f40-aa7b-cf10760fde3f", "assignerShortName": "INCD", "cveId": "CVE-2022-22798", "datePublished": "2022-05-12T19:48:42.372877Z", "dateReserved": "2022-01-07T00:00:00", "dateUpdated": "2024-09-17T02:47:50.302Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2024-27775
Vulnerability from cvelistv5
Published
2024-03-28 12:19
Modified
2024-08-02 00:41
Severity ?
EPSS score ?
Summary
SysAid - CWE-918: Server-Side Request Forgery (SSRF)
References
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2024-27775", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-04-10T19:45:47.358316Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-06-04T17:47:20.997Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" }, { "providerMetadata": { "dateUpdated": "2024-08-02T00:41:54.967Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://www.gov.il/en/Departments/faq/cve_advisories" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "SysAid", "vendor": "SysAid", "versions": [ { "lessThanOrEqual": "Upgrade to version 23.3.38 or later", "status": "affected", "version": "version 23.2.14 b18", "versionType": "custom" } ] } ], "credits": [ { "lang": "en", "type": "finder", "value": "Niv Levy" } ], "datePublic": "2024-03-28T12:18:00.000Z", "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "\n\n\u003cspan style=\"background-color: rgb(255, 255, 255);\"\u003eSysAid before version 23.2.14 b18 -\u0026nbsp;\u003cspan style=\"background-color: rgb(255, 255, 255);\"\u003eCWE-918: Server-Side Request Forgery (SSRF) may allow exposing the local OS user\u0027s NTLMv2 hash\u003c/span\u003e\n\n\u003c/span\u003e" } ], "value": "\nSysAid before version 23.2.14 b18 -\u00a0CWE-918: Server-Side Request Forgery (SSRF) may allow exposing the local OS user\u0027s NTLMv2 hash\n\n" } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.2, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-918", "description": "CWE-918 Server-Side Request Forgery (SSRF)", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-03-28T12:19:53.385Z", "orgId": "a57ee1ae-c9c1-4f40-aa7b-cf10760fde3f", "shortName": "INCD" }, "references": [ { "url": "https://www.gov.il/en/Departments/faq/cve_advisories" } ], "solutions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "\n\n\u003cspan style=\"background-color: rgb(255, 255, 255);\"\u003eUpgrade to version 23.3.38 or later\u003c/span\u003e\n\n\u003cbr\u003e" } ], "value": "\nUpgrade to version 23.3.38 or later\n\n" } ], "source": { "advisory": "ILVN-2024-0155", "discovery": "UNKNOWN" }, "title": "SysAid - CWE-918: Server-Side Request Forgery (SSRF)", "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "a57ee1ae-c9c1-4f40-aa7b-cf10760fde3f", "assignerShortName": "INCD", "cveId": "CVE-2024-27775", "datePublished": "2024-03-28T12:19:53.385Z", "dateReserved": "2024-02-26T09:27:55.323Z", "dateUpdated": "2024-08-02T00:41:54.967Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2022-23165
Vulnerability from cvelistv5
Published
2022-05-12 19:49
Modified
2024-09-16 17:59
Severity ?
EPSS score ?
Summary
Sysaid – Sysaid 14.2.0 Reflected Cross-Site Scripting (XSS)
References
▼ | URL | Tags |
---|---|---|
https://www.gov.il/en/departments/faq/cve_advisories | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T03:36:20.055Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://www.gov.il/en/departments/faq/cve_advisories" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "platforms": [ "cloud" ], "product": "Sysaid", "vendor": "SysAid", "versions": [ { "lessThanOrEqual": "22.2.19", "status": "affected", "version": "22.2.19 cloud version", "versionType": "custom" } ] }, { "platforms": [ "on premise" ], "product": "Sysaid", "vendor": "SysAid", "versions": [ { "lessThanOrEqual": "22.1.63", "status": "affected", "version": "22.1.63 on premise version", "versionType": "custom" } ] } ], "credits": [ { "lang": "en", "value": "Robert Catalin Raducioiu,, Francesco Di Castri" } ], "datePublic": "2022-05-09T00:00:00", "descriptions": [ { "lang": "en", "value": "Sysaid \u2013 Sysaid 14.2.0 Reflected Cross-Site Scripting (XSS) - The parameter \"helpPageName\" used by the page \"/help/treecontent.jsp\" suffers from a Reflected Cross-Site Scripting vulnerability. For an attacker to exploit this Cross-Site Scripting vulnerability, it\u0027s necessary for the affected product to expose the Offline Help Pages. An attacker may gain access to sensitive information or execute client-side code in the browser session of the victim user. Furthermore, an attacker would require the victim to open a malicious link. An attacker may exploit this vulnerability in order to perform phishing attacks. The attacker can receive sensitive data like server details, usernames, workstations, etc. He can also perform actions such as uploading files, deleting calls from the system" } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "HIGH", "attackVector": "LOCAL", "availabilityImpact": "LOW", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "LOW", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:L/A:L", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-79", "description": "CWE-79 Cross-site Scripting (XSS)", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2022-05-12T19:49:18", "orgId": "a57ee1ae-c9c1-4f40-aa7b-cf10760fde3f", "shortName": "INCD" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://www.gov.il/en/departments/faq/cve_advisories" } ], "solutions": [ { "lang": "en", "value": "Update to 22.2.20 cloud version, or to 22.1.64 on premise version." } ], "source": { "defect": [ "ILVN-2022-0020" ], "discovery": "EXTERNAL" }, "title": "Sysaid \u2013 Sysaid 14.2.0 Reflected Cross-Site Scripting (XSS)", "x_generator": { "engine": "Vulnogram 0.0.9" }, "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cna@cyber.gov.il", "DATE_PUBLIC": "2022-05-09T11:39:00.000Z", "ID": "CVE-2022-23165", "STATE": "PUBLIC", "TITLE": "Sysaid \u2013 Sysaid 14.2.0 Reflected Cross-Site Scripting (XSS)" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Sysaid", "version": { "version_data": [ { "platform": "cloud", "version_affected": "\u003c=", "version_name": "22.2.19 cloud version", "version_value": "22.2.19" }, { "platform": "on premise", "version_affected": "\u003c=", "version_name": "22.1.63 on premise version", "version_value": "22.1.63" } ] } } ] }, "vendor_name": "SysAid" } ] } }, "credit": [ { "lang": "eng", "value": "Robert Catalin Raducioiu,, Francesco Di Castri" } ], "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Sysaid \u2013 Sysaid 14.2.0 Reflected Cross-Site Scripting (XSS) - The parameter \"helpPageName\" used by the page \"/help/treecontent.jsp\" suffers from a Reflected Cross-Site Scripting vulnerability. For an attacker to exploit this Cross-Site Scripting vulnerability, it\u0027s necessary for the affected product to expose the Offline Help Pages. An attacker may gain access to sensitive information or execute client-side code in the browser session of the victim user. Furthermore, an attacker would require the victim to open a malicious link. An attacker may exploit this vulnerability in order to perform phishing attacks. The attacker can receive sensitive data like server details, usernames, workstations, etc. He can also perform actions such as uploading files, deleting calls from the system" } ] }, "generator": { "engine": "Vulnogram 0.0.9" }, "impact": { "cvss": { "attackComplexity": "HIGH", "attackVector": "LOCAL", "availabilityImpact": "LOW", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "LOW", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:L/A:L", "version": "3.1" } }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-79 Cross-site Scripting (XSS)" } ] } ] }, "references": { "reference_data": [ { "name": "https://www.gov.il/en/departments/faq/cve_advisories", "refsource": "MISC", "url": "https://www.gov.il/en/departments/faq/cve_advisories" } ] }, "solution": [ { "lang": "en", "value": "Update to 22.2.20 cloud version, or to 22.1.64 on premise version." } ], "source": { "defect": [ "ILVN-2022-0020" ], "discovery": "EXTERNAL" } } } }, "cveMetadata": { "assignerOrgId": "a57ee1ae-c9c1-4f40-aa7b-cf10760fde3f", "assignerShortName": "INCD", "cveId": "CVE-2022-23165", "datePublished": "2022-05-12T19:49:18.469085Z", "dateReserved": "2022-01-11T00:00:00", "dateUpdated": "2024-09-16T17:59:45.128Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2015-2998
Vulnerability from cvelistv5
Published
2015-06-08 14:00
Modified
2024-08-06 05:32
Severity ?
EPSS score ?
Summary
SysAid Help Desk before 15.2 uses a hardcoded encryption key, which makes it easier for remote attackers to obtain sensitive information, as demonstrated by decrypting the database password in WEB-INF/conf/serverConf.xml.
References
▼ | URL | Tags |
---|---|---|
http://seclists.org/fulldisclosure/2015/Jun/8 | mailing-list, x_refsource_FULLDISC | |
http://www.securityfocus.com/archive/1/535679/100/0/threaded | mailing-list, x_refsource_BUGTRAQ | |
http://www.securityfocus.com/bid/75035 | vdb-entry, x_refsource_BID | |
http://packetstormsecurity.com/files/132138/SysAid-Help-Desk-14.4-Code-Execution-Denial-Of-Service-Traversal-SQL-Injection.html | x_refsource_MISC | |
https://www.sysaid.com/blog/entry/sysaid-15-2-your-voice-your-service-desk | x_refsource_CONFIRM |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T05:32:21.290Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "20150603 [Multiple CVE\u0027s]: various critical vulnerabilities in SysAid Help Desk (RCE, file download, DoS, etc)", "tags": [ "mailing-list", "x_refsource_FULLDISC", "x_transferred" ], "url": "http://seclists.org/fulldisclosure/2015/Jun/8" }, { "name": "20150603 [Multiple CVE\u0027s]: various critical vulnerabilities in SysAid Help Desk (RCE, file download, DoS, etc)", "tags": [ "mailing-list", "x_refsource_BUGTRAQ", "x_transferred" ], "url": "http://www.securityfocus.com/archive/1/535679/100/0/threaded" }, { "name": "75035", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/75035" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://packetstormsecurity.com/files/132138/SysAid-Help-Desk-14.4-Code-Execution-Denial-Of-Service-Traversal-SQL-Injection.html" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://www.sysaid.com/blog/entry/sysaid-15-2-your-voice-your-service-desk" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2015-06-03T00:00:00", "descriptions": [ { "lang": "en", "value": "SysAid Help Desk before 15.2 uses a hardcoded encryption key, which makes it easier for remote attackers to obtain sensitive information, as demonstrated by decrypting the database password in WEB-INF/conf/serverConf.xml." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2018-10-09T18:57:01", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "name": "20150603 [Multiple CVE\u0027s]: various critical vulnerabilities in SysAid Help Desk (RCE, file download, DoS, etc)", "tags": [ "mailing-list", "x_refsource_FULLDISC" ], "url": "http://seclists.org/fulldisclosure/2015/Jun/8" }, { "name": "20150603 [Multiple CVE\u0027s]: various critical vulnerabilities in SysAid Help Desk (RCE, file download, DoS, etc)", "tags": [ "mailing-list", "x_refsource_BUGTRAQ" ], "url": "http://www.securityfocus.com/archive/1/535679/100/0/threaded" }, { "name": "75035", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/75035" }, { "tags": [ "x_refsource_MISC" ], "url": "http://packetstormsecurity.com/files/132138/SysAid-Help-Desk-14.4-Code-Execution-Denial-Of-Service-Traversal-SQL-Injection.html" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://www.sysaid.com/blog/entry/sysaid-15-2-your-voice-your-service-desk" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2015-2998", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "SysAid Help Desk before 15.2 uses a hardcoded encryption key, which makes it easier for remote attackers to obtain sensitive information, as demonstrated by decrypting the database password in WEB-INF/conf/serverConf.xml." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "20150603 [Multiple CVE\u0027s]: various critical vulnerabilities in SysAid Help Desk (RCE, file download, DoS, etc)", "refsource": "FULLDISC", "url": "http://seclists.org/fulldisclosure/2015/Jun/8" }, { "name": "20150603 [Multiple CVE\u0027s]: various critical vulnerabilities in SysAid Help Desk (RCE, file download, DoS, etc)", "refsource": "BUGTRAQ", "url": "http://www.securityfocus.com/archive/1/535679/100/0/threaded" }, { "name": "75035", "refsource": "BID", "url": "http://www.securityfocus.com/bid/75035" }, { "name": "http://packetstormsecurity.com/files/132138/SysAid-Help-Desk-14.4-Code-Execution-Denial-Of-Service-Traversal-SQL-Injection.html", "refsource": "MISC", "url": "http://packetstormsecurity.com/files/132138/SysAid-Help-Desk-14.4-Code-Execution-Denial-Of-Service-Traversal-SQL-Injection.html" }, { "name": "https://www.sysaid.com/blog/entry/sysaid-15-2-your-voice-your-service-desk", "refsource": "CONFIRM", "url": "https://www.sysaid.com/blog/entry/sysaid-15-2-your-voice-your-service-desk" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2015-2998", "datePublished": "2015-06-08T14:00:00", "dateReserved": "2015-04-07T00:00:00", "dateUpdated": "2024-08-06T05:32:21.290Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2022-22796
Vulnerability from cvelistv5
Published
2022-05-12 19:47
Modified
2024-09-17 02:27
Severity ?
EPSS score ?
Summary
Sysaid – Sysaid System Takeover
References
▼ | URL | Tags |
---|---|---|
https://www.gov.il/en/departments/faq/cve_advisories | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T03:21:49.117Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://www.gov.il/en/departments/faq/cve_advisories" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "platforms": [ "cloud" ], "product": "Sysaid", "vendor": "SysAid", "versions": [ { "lessThanOrEqual": "21.1.29", "status": "affected", "version": "21.1.29 cloud version", "versionType": "custom" } ] }, { "platforms": [ "on premise" ], "product": "Sysaid", "vendor": "SysAid", "versions": [ { "lessThanOrEqual": "21.4.44", "status": "affected", "version": "21.4.44 on premise version", "versionType": "custom" } ] } ], "credits": [ { "lang": "en", "value": "Dudu Moyal, Gad Abuhatziera, Moriel Harush, Alon Zuker - Sophtix Security LTD" } ], "datePublic": "2022-05-09T00:00:00", "descriptions": [ { "lang": "en", "value": "Sysaid \u2013 Sysaid System Takeover - An attacker can bypass the authentication process by accessing to: /wmiwizard.jsp, Then to: /ConcurrentLogin.jsp, then click on the login button, and it will redirect you to /home.jsp without any authentication." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "ADJACENT_NETWORK", "availabilityImpact": "LOW", "baseScore": 7, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:A/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:L", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "description": "System Take Over", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2022-05-12T19:47:32", "orgId": "a57ee1ae-c9c1-4f40-aa7b-cf10760fde3f", "shortName": "INCD" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://www.gov.il/en/departments/faq/cve_advisories" } ], "solutions": [ { "lang": "en", "value": "Update to 21.1.30 cloud version, or to 21.4.45 on premise version." } ], "source": { "defect": [ "ILVN-2022-0017" ], "discovery": "EXTERNAL" }, "title": "Sysaid \u2013 Sysaid System Takeover", "x_generator": { "engine": "Vulnogram 0.0.9" }, "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cna@cyber.gov.il", "DATE_PUBLIC": "2022-05-09T11:39:00.000Z", "ID": "CVE-2022-22796", "STATE": "PUBLIC", "TITLE": "Sysaid \u2013 Sysaid System Takeover" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Sysaid", "version": { "version_data": [ { "platform": "cloud", "version_affected": "\u003c=", "version_name": "21.1.29 cloud version", "version_value": "21.1.29" }, { "platform": "on premise", "version_affected": "\u003c=", "version_name": "21.4.44 on premise version", "version_value": "21.4.44" } ] } } ] }, "vendor_name": "SysAid" } ] } }, "credit": [ { "lang": "eng", "value": "Dudu Moyal, Gad Abuhatziera, Moriel Harush, Alon Zuker - Sophtix Security LTD" } ], "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Sysaid \u2013 Sysaid System Takeover - An attacker can bypass the authentication process by accessing to: /wmiwizard.jsp, Then to: /ConcurrentLogin.jsp, then click on the login button, and it will redirect you to /home.jsp without any authentication." } ] }, "generator": { "engine": "Vulnogram 0.0.9" }, "impact": { "cvss": { "attackComplexity": "LOW", "attackVector": "ADJACENT_NETWORK", "availabilityImpact": "LOW", "baseScore": 7, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:A/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:L", "version": "3.1" } }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "System Take Over" } ] } ] }, "references": { "reference_data": [ { "name": "https://www.gov.il/en/departments/faq/cve_advisories", "refsource": "MISC", "url": "https://www.gov.il/en/departments/faq/cve_advisories" } ] }, "solution": [ { "lang": "en", "value": "Update to 21.1.30 cloud version, or to 21.4.45 on premise version." } ], "source": { "defect": [ "ILVN-2022-0017" ], "discovery": "EXTERNAL" } } } }, "cveMetadata": { "assignerOrgId": "a57ee1ae-c9c1-4f40-aa7b-cf10760fde3f", "assignerShortName": "INCD", "cveId": "CVE-2022-22796", "datePublished": "2022-05-12T19:47:32.643968Z", "dateReserved": "2022-01-07T00:00:00", "dateUpdated": "2024-09-17T02:27:31.416Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-32226
Vulnerability from cvelistv5
Published
2023-07-30 07:53
Modified
2024-10-11 14:07
Severity ?
EPSS score ?
Summary
Sysaid - CWE-552: Files or Directories Accessible to External Parties
References
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T15:10:24.214Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://www.gov.il/en/Departments/faq/cve_advisories" } ], "title": "CVE Program Container" }, { "metrics": [ { "other": { "content": { "id": "CVE-2023-32226", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-10-11T13:03:26.377244Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-10-11T14:07:55.756Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "Sysaid", "vendor": "Sysaid", "versions": [ { "lessThan": "23.2.14 b18", "status": "affected", "version": "All versions", "versionType": "custom" } ] } ], "credits": [ { "lang": "en", "type": "finder", "user": "00000000-0000-4000-9000-000000000000", "value": "Niv Levy" } ], "datePublic": "2023-07-30T06:54:00.000Z", "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": " Sysaid - CWE-552: Files or Directories Accessible to External Parties -\u0026nbsp;\n\n\u003cspan style=\"background-color: rgb(255, 255, 255);\"\u003eAuthenticated users may exfiltrate files from the server via an unspecified method.\u003c/span\u003e\n\n" } ], "value": " Sysaid - CWE-552: Files or Directories Accessible to External Parties -\u00a0\n\nAuthenticated users may exfiltrate files from the server via an unspecified method.\n\n" } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.3, "baseSeverity": "HIGH", "confidentialityImpact": "LOW", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:H/A:H", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-552", "description": "CWE-552 Files or Directories Accessible to External Parties", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2023-07-30T07:53:21.574Z", "orgId": "a57ee1ae-c9c1-4f40-aa7b-cf10760fde3f", "shortName": "INCD" }, "references": [ { "url": "https://www.gov.il/en/Departments/faq/cve_advisories" } ], "solutions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "\n\n\u003cspan style=\"background-color: rgb(255, 255, 255);\"\u003eUpdate to version 23.2.14 b18 (On-Prem). \u003c/span\u003e\n\n\u003cbr\u003e" } ], "value": "\nUpdate to version 23.2.14 b18 (On-Prem). \n\n\n" } ], "source": { "advisory": "ILVN-2023-0113", "discovery": "UNKNOWN" }, "title": " Sysaid - CWE-552: Files or Directories Accessible to External Parties", "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "a57ee1ae-c9c1-4f40-aa7b-cf10760fde3f", "assignerShortName": "INCD", "cveId": "CVE-2023-32226", "datePublished": "2023-07-30T07:53:21.574Z", "dateReserved": "2023-05-04T20:53:11.224Z", "dateUpdated": "2024-10-11T14:07:55.756Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2015-2995
Vulnerability from cvelistv5
Published
2015-06-08 14:00
Modified
2024-08-06 05:32
Severity ?
EPSS score ?
Summary
The RdsLogsEntry servlet in SysAid Help Desk before 15.2 does not properly check file extensions, which allows remote attackers to upload and execute arbitrary files via a NULL byte after the extension, as demonstrated by a .war%00 file.
References
▼ | URL | Tags |
---|---|---|
http://www.rapid7.com/db/modules/exploit/multi/http/sysaid_rdslogs_file_upload | x_refsource_MISC | |
http://seclists.org/fulldisclosure/2015/Jun/8 | mailing-list, x_refsource_FULLDISC | |
http://www.securityfocus.com/archive/1/535679/100/0/threaded | mailing-list, x_refsource_BUGTRAQ | |
http://packetstormsecurity.com/files/132138/SysAid-Help-Desk-14.4-Code-Execution-Denial-Of-Service-Traversal-SQL-Injection.html | x_refsource_MISC | |
http://www.securityfocus.com/bid/75038 | vdb-entry, x_refsource_BID | |
https://www.exploit-db.com/exploits/37667/ | exploit, x_refsource_EXPLOIT-DB | |
https://www.sysaid.com/blog/entry/sysaid-15-2-your-voice-your-service-desk | x_refsource_CONFIRM |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T05:32:21.342Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://www.rapid7.com/db/modules/exploit/multi/http/sysaid_rdslogs_file_upload" }, { "name": "20150603 [Multiple CVE\u0027s]: various critical vulnerabilities in SysAid Help Desk (RCE, file download, DoS, etc)", "tags": [ "mailing-list", "x_refsource_FULLDISC", "x_transferred" ], "url": "http://seclists.org/fulldisclosure/2015/Jun/8" }, { "name": "20150603 [Multiple CVE\u0027s]: various critical vulnerabilities in SysAid Help Desk (RCE, file download, DoS, etc)", "tags": [ "mailing-list", "x_refsource_BUGTRAQ", "x_transferred" ], "url": "http://www.securityfocus.com/archive/1/535679/100/0/threaded" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://packetstormsecurity.com/files/132138/SysAid-Help-Desk-14.4-Code-Execution-Denial-Of-Service-Traversal-SQL-Injection.html" }, { "name": "75038", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/75038" }, { "name": "37667", "tags": [ "exploit", "x_refsource_EXPLOIT-DB", "x_transferred" ], "url": "https://www.exploit-db.com/exploits/37667/" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://www.sysaid.com/blog/entry/sysaid-15-2-your-voice-your-service-desk" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2015-06-03T00:00:00", "descriptions": [ { "lang": "en", "value": "The RdsLogsEntry servlet in SysAid Help Desk before 15.2 does not properly check file extensions, which allows remote attackers to upload and execute arbitrary files via a NULL byte after the extension, as demonstrated by a .war%00 file." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2018-10-09T18:57:01", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "http://www.rapid7.com/db/modules/exploit/multi/http/sysaid_rdslogs_file_upload" }, { "name": "20150603 [Multiple CVE\u0027s]: various critical vulnerabilities in SysAid Help Desk (RCE, file download, DoS, etc)", "tags": [ "mailing-list", "x_refsource_FULLDISC" ], "url": "http://seclists.org/fulldisclosure/2015/Jun/8" }, { "name": "20150603 [Multiple CVE\u0027s]: various critical vulnerabilities in SysAid Help Desk (RCE, file download, DoS, etc)", "tags": [ "mailing-list", "x_refsource_BUGTRAQ" ], "url": "http://www.securityfocus.com/archive/1/535679/100/0/threaded" }, { "tags": [ "x_refsource_MISC" ], "url": "http://packetstormsecurity.com/files/132138/SysAid-Help-Desk-14.4-Code-Execution-Denial-Of-Service-Traversal-SQL-Injection.html" }, { "name": "75038", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/75038" }, { "name": "37667", "tags": [ "exploit", "x_refsource_EXPLOIT-DB" ], "url": "https://www.exploit-db.com/exploits/37667/" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://www.sysaid.com/blog/entry/sysaid-15-2-your-voice-your-service-desk" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2015-2995", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "The RdsLogsEntry servlet in SysAid Help Desk before 15.2 does not properly check file extensions, which allows remote attackers to upload and execute arbitrary files via a NULL byte after the extension, as demonstrated by a .war%00 file." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "http://www.rapid7.com/db/modules/exploit/multi/http/sysaid_rdslogs_file_upload", "refsource": "MISC", "url": "http://www.rapid7.com/db/modules/exploit/multi/http/sysaid_rdslogs_file_upload" }, { "name": "20150603 [Multiple CVE\u0027s]: various critical vulnerabilities in SysAid Help Desk (RCE, file download, DoS, etc)", "refsource": "FULLDISC", "url": "http://seclists.org/fulldisclosure/2015/Jun/8" }, { "name": "20150603 [Multiple CVE\u0027s]: various critical vulnerabilities in SysAid Help Desk (RCE, file download, DoS, etc)", "refsource": "BUGTRAQ", "url": "http://www.securityfocus.com/archive/1/535679/100/0/threaded" }, { "name": "http://packetstormsecurity.com/files/132138/SysAid-Help-Desk-14.4-Code-Execution-Denial-Of-Service-Traversal-SQL-Injection.html", "refsource": "MISC", "url": "http://packetstormsecurity.com/files/132138/SysAid-Help-Desk-14.4-Code-Execution-Denial-Of-Service-Traversal-SQL-Injection.html" }, { "name": "75038", "refsource": "BID", "url": "http://www.securityfocus.com/bid/75038" }, { "name": "37667", "refsource": "EXPLOIT-DB", "url": "https://www.exploit-db.com/exploits/37667/" }, { "name": "https://www.sysaid.com/blog/entry/sysaid-15-2-your-voice-your-service-desk", "refsource": "CONFIRM", "url": "https://www.sysaid.com/blog/entry/sysaid-15-2-your-voice-your-service-desk" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2015-2995", "datePublished": "2015-06-08T14:00:00", "dateReserved": "2015-04-07T00:00:00", "dateUpdated": "2024-08-06T05:32:21.342Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2022-23166
Vulnerability from cvelistv5
Published
2022-05-12 19:49
Modified
2024-09-16 22:24
Severity ?
EPSS score ?
Summary
Sysaid – Sysaid Local File Inclusion (LFI)
References
▼ | URL | Tags |
---|---|---|
https://www.gov.il/en/departments/faq/cve_advisories | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T03:36:20.001Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://www.gov.il/en/departments/faq/cve_advisories" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "platforms": [ "cloud" ], "product": "Sysaid", "vendor": "SysAid", "versions": [ { "lessThanOrEqual": "22.2.19", "status": "affected", "version": "22.2.19 cloud version", "versionType": "custom" } ] }, { "platforms": [ "on premise" ], "product": "Sysaid", "vendor": "SysAid", "versions": [ { "lessThanOrEqual": "22.1.63", "status": "affected", "version": "22.1.63 on premise version", "versionType": "custom" } ] } ], "credits": [ { "lang": "en", "value": "Dudu Moyal - Sophtix Security LTD" } ], "datePublic": "2022-05-09T00:00:00", "descriptions": [ { "lang": "en", "value": "Sysaid \u2013 Sysaid Local File Inclusion (LFI) \u2013 An unauthenticated attacker can access to the system by accessing to \"/lib/tinymce/examples/index.html\" path. in the \"Insert/Edit Embedded Media\" window Choose Type : iFrame and File/URL : [here is the LFI] Solution: Update to 22.2.20 cloud version, or to 22.1.64 on premise version." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "LOW", "baseScore": 6.1, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "LOW", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:L/A:L", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "description": "Local File Inclusion", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2022-05-12T19:49:52", "orgId": "a57ee1ae-c9c1-4f40-aa7b-cf10760fde3f", "shortName": "INCD" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://www.gov.il/en/departments/faq/cve_advisories" } ], "solutions": [ { "lang": "en", "value": "Update to 22.2.20 cloud version, or to 22.1.64 on premise version." } ], "source": { "defect": [ "ILVN-2022-0021" ], "discovery": "EXTERNAL" }, "title": "Sysaid \u2013 Sysaid Local File Inclusion (LFI)", "x_generator": { "engine": "Vulnogram 0.0.9" }, "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cna@cyber.gov.il", "DATE_PUBLIC": "2022-05-09T11:39:00.000Z", "ID": "CVE-2022-23166", "STATE": "PUBLIC", "TITLE": "Sysaid \u2013 Sysaid Local File Inclusion (LFI)" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Sysaid", "version": { "version_data": [ { "platform": "cloud", "version_affected": "\u003c=", "version_name": "22.2.19 cloud version", "version_value": "22.2.19" }, { "platform": "on premise", "version_affected": "\u003c=", "version_name": "22.1.63 on premise version", "version_value": "22.1.63" } ] } } ] }, "vendor_name": "SysAid" } ] } }, "credit": [ { "lang": "eng", "value": "Dudu Moyal - Sophtix Security LTD" } ], "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Sysaid \u2013 Sysaid Local File Inclusion (LFI) \u2013 An unauthenticated attacker can access to the system by accessing to \"/lib/tinymce/examples/index.html\" path. in the \"Insert/Edit Embedded Media\" window Choose Type : iFrame and File/URL : [here is the LFI] Solution: Update to 22.2.20 cloud version, or to 22.1.64 on premise version." } ] }, "generator": { "engine": "Vulnogram 0.0.9" }, "impact": { "cvss": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "LOW", "baseScore": 6.1, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "LOW", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:L/A:L", "version": "3.1" } }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Local File Inclusion" } ] } ] }, "references": { "reference_data": [ { "name": "https://www.gov.il/en/departments/faq/cve_advisories", "refsource": "MISC", "url": "https://www.gov.il/en/departments/faq/cve_advisories" } ] }, "solution": [ { "lang": "en", "value": "Update to 22.2.20 cloud version, or to 22.1.64 on premise version." } ], "source": { "defect": [ "ILVN-2022-0021" ], "discovery": "EXTERNAL" } } } }, "cveMetadata": { "assignerOrgId": "a57ee1ae-c9c1-4f40-aa7b-cf10760fde3f", "assignerShortName": "INCD", "cveId": "CVE-2022-23166", "datePublished": "2022-05-12T19:49:52.719777Z", "dateReserved": "2022-01-11T00:00:00", "dateUpdated": "2024-09-16T22:24:47.336Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-43971
Vulnerability from cvelistv5
Published
2022-01-11 19:17
Modified
2024-08-04 04:10
Severity ?
EPSS score ?
Summary
A SQL injection vulnerability in /mobile/SelectUsers.jsp in SysAid ITIL 20.4.74 b10 allows a remote authenticated attacker to execute arbitrary SQL commands via the filterText parameter.
References
▼ | URL | Tags |
---|---|---|
https://www.sysaid.com/it-service-management-software/incident-management | x_refsource_MISC | |
https://github.com/atredispartners/advisories/blob/master/ATREDIS-2021-0002.md | x_refsource_MISC | |
https://github.com/atredispartners/advisories/blob/master/ATREDIS-2022-0001.md | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T04:10:17.124Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://www.sysaid.com/it-service-management-software/incident-management" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://github.com/atredispartners/advisories/blob/master/ATREDIS-2021-0002.md" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://github.com/atredispartners/advisories/blob/master/ATREDIS-2022-0001.md" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "descriptions": [ { "lang": "en", "value": "A SQL injection vulnerability in /mobile/SelectUsers.jsp in SysAid ITIL 20.4.74 b10 allows a remote authenticated attacker to execute arbitrary SQL commands via the filterText parameter." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2022-01-11T19:17:47", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://www.sysaid.com/it-service-management-software/incident-management" }, { "tags": [ "x_refsource_MISC" ], "url": "https://github.com/atredispartners/advisories/blob/master/ATREDIS-2021-0002.md" }, { "tags": [ "x_refsource_MISC" ], "url": "https://github.com/atredispartners/advisories/blob/master/ATREDIS-2022-0001.md" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2021-43971", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "A SQL injection vulnerability in /mobile/SelectUsers.jsp in SysAid ITIL 20.4.74 b10 allows a remote authenticated attacker to execute arbitrary SQL commands via the filterText parameter." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "https://www.sysaid.com/it-service-management-software/incident-management", "refsource": "MISC", "url": "https://www.sysaid.com/it-service-management-software/incident-management" }, { "name": "https://github.com/atredispartners/advisories/blob/master/ATREDIS-2021-0002.md", "refsource": "MISC", "url": "https://github.com/atredispartners/advisories/blob/master/ATREDIS-2021-0002.md" }, { "name": "https://github.com/atredispartners/advisories/blob/master/ATREDIS-2022-0001.md", "refsource": "MISC", "url": "https://github.com/atredispartners/advisories/blob/master/ATREDIS-2022-0001.md" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2021-43971", "datePublished": "2022-01-11T19:17:47", "dateReserved": "2021-11-17T00:00:00", "dateUpdated": "2024-08-04T04:10:17.124Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2015-2996
Vulnerability from cvelistv5
Published
2015-06-08 14:00
Modified
2024-08-06 05:32
Severity ?
EPSS score ?
Summary
Multiple directory traversal vulnerabilities in SysAid Help Desk before 15.2 allow remote attackers to (1) read arbitrary files via a .. (dot dot) in the fileName parameter to getGfiUpgradeFile or (2) cause a denial of service (CPU and memory consumption) via a .. (dot dot) in the fileName parameter to calculateRdsFileChecksum.
References
▼ | URL | Tags |
---|---|---|
http://seclists.org/fulldisclosure/2015/Jun/8 | mailing-list, x_refsource_FULLDISC | |
http://www.securityfocus.com/archive/1/535679/100/0/threaded | mailing-list, x_refsource_BUGTRAQ | |
http://packetstormsecurity.com/files/132138/SysAid-Help-Desk-14.4-Code-Execution-Denial-Of-Service-Traversal-SQL-Injection.html | x_refsource_MISC | |
http://www.securityfocus.com/bid/75038 | vdb-entry, x_refsource_BID | |
https://www.sysaid.com/blog/entry/sysaid-15-2-your-voice-your-service-desk | x_refsource_CONFIRM |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T05:32:21.252Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "20150603 [Multiple CVE\u0027s]: various critical vulnerabilities in SysAid Help Desk (RCE, file download, DoS, etc)", "tags": [ "mailing-list", "x_refsource_FULLDISC", "x_transferred" ], "url": "http://seclists.org/fulldisclosure/2015/Jun/8" }, { "name": "20150603 [Multiple CVE\u0027s]: various critical vulnerabilities in SysAid Help Desk (RCE, file download, DoS, etc)", "tags": [ "mailing-list", "x_refsource_BUGTRAQ", "x_transferred" ], "url": "http://www.securityfocus.com/archive/1/535679/100/0/threaded" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://packetstormsecurity.com/files/132138/SysAid-Help-Desk-14.4-Code-Execution-Denial-Of-Service-Traversal-SQL-Injection.html" }, { "name": "75038", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/75038" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://www.sysaid.com/blog/entry/sysaid-15-2-your-voice-your-service-desk" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2015-06-03T00:00:00", "descriptions": [ { "lang": "en", "value": "Multiple directory traversal vulnerabilities in SysAid Help Desk before 15.2 allow remote attackers to (1) read arbitrary files via a .. (dot dot) in the fileName parameter to getGfiUpgradeFile or (2) cause a denial of service (CPU and memory consumption) via a .. (dot dot) in the fileName parameter to calculateRdsFileChecksum." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2018-10-09T18:57:01", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "name": "20150603 [Multiple CVE\u0027s]: various critical vulnerabilities in SysAid Help Desk (RCE, file download, DoS, etc)", "tags": [ "mailing-list", "x_refsource_FULLDISC" ], "url": "http://seclists.org/fulldisclosure/2015/Jun/8" }, { "name": "20150603 [Multiple CVE\u0027s]: various critical vulnerabilities in SysAid Help Desk (RCE, file download, DoS, etc)", "tags": [ "mailing-list", "x_refsource_BUGTRAQ" ], "url": "http://www.securityfocus.com/archive/1/535679/100/0/threaded" }, { "tags": [ "x_refsource_MISC" ], "url": "http://packetstormsecurity.com/files/132138/SysAid-Help-Desk-14.4-Code-Execution-Denial-Of-Service-Traversal-SQL-Injection.html" }, { "name": "75038", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/75038" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://www.sysaid.com/blog/entry/sysaid-15-2-your-voice-your-service-desk" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2015-2996", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Multiple directory traversal vulnerabilities in SysAid Help Desk before 15.2 allow remote attackers to (1) read arbitrary files via a .. (dot dot) in the fileName parameter to getGfiUpgradeFile or (2) cause a denial of service (CPU and memory consumption) via a .. (dot dot) in the fileName parameter to calculateRdsFileChecksum." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "20150603 [Multiple CVE\u0027s]: various critical vulnerabilities in SysAid Help Desk (RCE, file download, DoS, etc)", "refsource": "FULLDISC", "url": "http://seclists.org/fulldisclosure/2015/Jun/8" }, { "name": "20150603 [Multiple CVE\u0027s]: various critical vulnerabilities in SysAid Help Desk (RCE, file download, DoS, etc)", "refsource": "BUGTRAQ", "url": "http://www.securityfocus.com/archive/1/535679/100/0/threaded" }, { "name": "http://packetstormsecurity.com/files/132138/SysAid-Help-Desk-14.4-Code-Execution-Denial-Of-Service-Traversal-SQL-Injection.html", "refsource": "MISC", "url": "http://packetstormsecurity.com/files/132138/SysAid-Help-Desk-14.4-Code-Execution-Denial-Of-Service-Traversal-SQL-Injection.html" }, { "name": "75038", "refsource": "BID", "url": "http://www.securityfocus.com/bid/75038" }, { "name": "https://www.sysaid.com/blog/entry/sysaid-15-2-your-voice-your-service-desk", "refsource": "CONFIRM", "url": "https://www.sysaid.com/blog/entry/sysaid-15-2-your-voice-your-service-desk" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2015-2996", "datePublished": "2015-06-08T14:00:00", "dateReserved": "2015-04-07T00:00:00", "dateUpdated": "2024-08-06T05:32:21.252Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2022-22797
Vulnerability from cvelistv5
Published
2022-05-12 19:48
Modified
2024-09-16 19:51
Severity ?
EPSS score ?
Summary
Sysaid – sysaid Open Redirect
References
▼ | URL | Tags |
---|---|---|
https://www.gov.il/en/departments/faq/cve_advisories | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T03:21:49.155Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://www.gov.il/en/departments/faq/cve_advisories" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "platforms": [ "cloud" ], "product": "Sysaid", "vendor": "SysAid", "versions": [ { "lessThanOrEqual": "22.1.49", "status": "affected", "version": "22.1.49 cloud version", "versionType": "custom" } ] }, { "platforms": [ "on premise" ], "product": "Sysaid", "vendor": "SysAid", "versions": [ { "lessThanOrEqual": "22.1.63", "status": "affected", "version": "22.1.63 on premise version", "versionType": "custom" } ] } ], "credits": [ { "lang": "en", "value": "Moriel Harush - Sophtix Security LTD" } ], "datePublic": "2022-05-09T00:00:00", "descriptions": [ { "lang": "en", "value": "Sysaid \u2013 sysaid Open Redirect - An Attacker can change the redirect link at the parameter \"redirectURL\" from\"GET\" request from the url location: /CommunitySSORedirect.jsp?redirectURL=https://google.com. Unvalidated redirects and forwards are possible when a web application accepts untrusted input that could cause the web application to redirect the request to a URL contained within untrusted input. By modifying untrusted URL input to a malicious site, an attacker may successfully launch a phishing scam and steal user credentials." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 4.6, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "LOW", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-601", "description": "CWE-601 URL Redirection to Untrusted Site (\u0027Open Redirect\u0027)", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2022-05-12T19:48:08", "orgId": "a57ee1ae-c9c1-4f40-aa7b-cf10760fde3f", "shortName": "INCD" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://www.gov.il/en/departments/faq/cve_advisories" } ], "solutions": [ { "lang": "en", "value": "Update to 22.1.50 cloud version, or to 22.1.64 on premise version." } ], "source": { "defect": [ "ILVN-2022-0018" ], "discovery": "EXTERNAL" }, "title": "Sysaid \u2013 sysaid Open Redirect", "x_generator": { "engine": "Vulnogram 0.0.9" }, "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cna@cyber.gov.il", "DATE_PUBLIC": "2022-05-09T11:39:00.000Z", "ID": "CVE-2022-22797", "STATE": "PUBLIC", "TITLE": "Sysaid \u2013 sysaid Open Redirect" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Sysaid", "version": { "version_data": [ { "platform": "cloud", "version_affected": "\u003c=", "version_name": "22.1.49 cloud version", "version_value": "22.1.49" }, { "platform": "on premise", "version_affected": "\u003c=", "version_name": "22.1.63 on premise version", "version_value": "22.1.63" } ] } } ] }, "vendor_name": "SysAid" } ] } }, "credit": [ { "lang": "eng", "value": "Moriel Harush - Sophtix Security LTD" } ], "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Sysaid \u2013 sysaid Open Redirect - An Attacker can change the redirect link at the parameter \"redirectURL\" from\"GET\" request from the url location: /CommunitySSORedirect.jsp?redirectURL=https://google.com. Unvalidated redirects and forwards are possible when a web application accepts untrusted input that could cause the web application to redirect the request to a URL contained within untrusted input. By modifying untrusted URL input to a malicious site, an attacker may successfully launch a phishing scam and steal user credentials." } ] }, "generator": { "engine": "Vulnogram 0.0.9" }, "impact": { "cvss": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 4.6, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "LOW", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", "version": "3.1" } }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-601 URL Redirection to Untrusted Site (\u0027Open Redirect\u0027)" } ] } ] }, "references": { "reference_data": [ { "name": "https://www.gov.il/en/departments/faq/cve_advisories", "refsource": "MISC", "url": "https://www.gov.il/en/departments/faq/cve_advisories" } ] }, "solution": [ { "lang": "en", "value": "Update to 22.1.50 cloud version, or to 22.1.64 on premise version." } ], "source": { "defect": [ "ILVN-2022-0018" ], "discovery": "EXTERNAL" } } } }, "cveMetadata": { "assignerOrgId": "a57ee1ae-c9c1-4f40-aa7b-cf10760fde3f", "assignerShortName": "INCD", "cveId": "CVE-2022-22797", "datePublished": "2022-05-12T19:48:08.939813Z", "dateReserved": "2022-01-07T00:00:00", "dateUpdated": "2024-09-16T19:51:58.210Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2015-2997
Vulnerability from cvelistv5
Published
2015-06-08 14:00
Modified
2024-08-06 05:32
Severity ?
EPSS score ?
Summary
SysAid Help Desk before 15.2 allows remote attackers to obtain sensitive information via an invalid value in the accountid parameter to getAgentLogFile, as demonstrated by a large directory traversal sequence, which reveals the installation path in an error message.
References
▼ | URL | Tags |
---|---|---|
http://seclists.org/fulldisclosure/2015/Jun/8 | mailing-list, x_refsource_FULLDISC | |
http://www.securityfocus.com/archive/1/535679/100/0/threaded | mailing-list, x_refsource_BUGTRAQ | |
http://packetstormsecurity.com/files/132138/SysAid-Help-Desk-14.4-Code-Execution-Denial-Of-Service-Traversal-SQL-Injection.html | x_refsource_MISC | |
http://www.securityfocus.com/bid/75038 | vdb-entry, x_refsource_BID | |
https://www.sysaid.com/blog/entry/sysaid-15-2-your-voice-your-service-desk | x_refsource_CONFIRM |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T05:32:21.195Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "20150603 [Multiple CVE\u0027s]: various critical vulnerabilities in SysAid Help Desk (RCE, file download, DoS, etc)", "tags": [ "mailing-list", "x_refsource_FULLDISC", "x_transferred" ], "url": "http://seclists.org/fulldisclosure/2015/Jun/8" }, { "name": "20150603 [Multiple CVE\u0027s]: various critical vulnerabilities in SysAid Help Desk (RCE, file download, DoS, etc)", "tags": [ "mailing-list", "x_refsource_BUGTRAQ", "x_transferred" ], "url": "http://www.securityfocus.com/archive/1/535679/100/0/threaded" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://packetstormsecurity.com/files/132138/SysAid-Help-Desk-14.4-Code-Execution-Denial-Of-Service-Traversal-SQL-Injection.html" }, { "name": "75038", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/75038" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://www.sysaid.com/blog/entry/sysaid-15-2-your-voice-your-service-desk" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2015-06-03T00:00:00", "descriptions": [ { "lang": "en", "value": "SysAid Help Desk before 15.2 allows remote attackers to obtain sensitive information via an invalid value in the accountid parameter to getAgentLogFile, as demonstrated by a large directory traversal sequence, which reveals the installation path in an error message." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2018-10-09T18:57:01", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "name": "20150603 [Multiple CVE\u0027s]: various critical vulnerabilities in SysAid Help Desk (RCE, file download, DoS, etc)", "tags": [ "mailing-list", "x_refsource_FULLDISC" ], "url": "http://seclists.org/fulldisclosure/2015/Jun/8" }, { "name": "20150603 [Multiple CVE\u0027s]: various critical vulnerabilities in SysAid Help Desk (RCE, file download, DoS, etc)", "tags": [ "mailing-list", "x_refsource_BUGTRAQ" ], "url": "http://www.securityfocus.com/archive/1/535679/100/0/threaded" }, { "tags": [ "x_refsource_MISC" ], "url": "http://packetstormsecurity.com/files/132138/SysAid-Help-Desk-14.4-Code-Execution-Denial-Of-Service-Traversal-SQL-Injection.html" }, { "name": "75038", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/75038" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://www.sysaid.com/blog/entry/sysaid-15-2-your-voice-your-service-desk" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2015-2997", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "SysAid Help Desk before 15.2 allows remote attackers to obtain sensitive information via an invalid value in the accountid parameter to getAgentLogFile, as demonstrated by a large directory traversal sequence, which reveals the installation path in an error message." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "20150603 [Multiple CVE\u0027s]: various critical vulnerabilities in SysAid Help Desk (RCE, file download, DoS, etc)", "refsource": "FULLDISC", "url": "http://seclists.org/fulldisclosure/2015/Jun/8" }, { "name": "20150603 [Multiple CVE\u0027s]: various critical vulnerabilities in SysAid Help Desk (RCE, file download, DoS, etc)", "refsource": "BUGTRAQ", "url": "http://www.securityfocus.com/archive/1/535679/100/0/threaded" }, { "name": "http://packetstormsecurity.com/files/132138/SysAid-Help-Desk-14.4-Code-Execution-Denial-Of-Service-Traversal-SQL-Injection.html", "refsource": "MISC", "url": "http://packetstormsecurity.com/files/132138/SysAid-Help-Desk-14.4-Code-Execution-Denial-Of-Service-Traversal-SQL-Injection.html" }, { "name": "75038", "refsource": "BID", "url": "http://www.securityfocus.com/bid/75038" }, { "name": "https://www.sysaid.com/blog/entry/sysaid-15-2-your-voice-your-service-desk", "refsource": "CONFIRM", "url": "https://www.sysaid.com/blog/entry/sysaid-15-2-your-voice-your-service-desk" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2015-2997", "datePublished": "2015-06-08T14:00:00", "dateReserved": "2015-04-07T00:00:00", "dateUpdated": "2024-08-06T05:32:21.195Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-30486
Vulnerability from cvelistv5
Published
2021-07-22 11:54
Modified
2024-08-03 22:32
Severity ?
EPSS score ?
Summary
SysAid 20.3.64 b14 is affected by Blind and Stacker SQL injection via AssetManagementChart.jsp (GET computerID), AssetManagementChart.jsp (POST group1), AssetManagementList.jsp (GET computerID or group1), or AssetManagementSummary.jsp (GET group1).
References
▼ | URL | Tags |
---|---|---|
https://eh337.net/2021/04/10/sysaid-ii/ | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T22:32:41.132Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://eh337.net/2021/04/10/sysaid-ii/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "descriptions": [ { "lang": "en", "value": "SysAid 20.3.64 b14 is affected by Blind and Stacker SQL injection via AssetManagementChart.jsp (GET computerID), AssetManagementChart.jsp (POST group1), AssetManagementList.jsp (GET computerID or group1), or AssetManagementSummary.jsp (GET group1)." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2021-07-22T11:54:57", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://eh337.net/2021/04/10/sysaid-ii/" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2021-30486", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "SysAid 20.3.64 b14 is affected by Blind and Stacker SQL injection via AssetManagementChart.jsp (GET computerID), AssetManagementChart.jsp (POST group1), AssetManagementList.jsp (GET computerID or group1), or AssetManagementSummary.jsp (GET group1)." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "https://eh337.net/2021/04/10/sysaid-ii/", "refsource": "MISC", "url": "https://eh337.net/2021/04/10/sysaid-ii/" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2021-30486", "datePublished": "2021-07-22T11:54:57", "dateReserved": "2021-04-10T00:00:00", "dateUpdated": "2024-08-03T22:32:41.132Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-31862
Vulnerability from cvelistv5
Published
2021-10-29 10:44
Modified
2024-08-03 23:10
Severity ?
EPSS score ?
Summary
SysAid 20.4.74 allows XSS via the KeepAlive.jsp stamp parameter without any authentication.
References
▼ | URL | Tags |
---|---|---|
https://www.sysaid.com/product/on-premise/latest-release | x_refsource_MISC | |
https://github.com/RobertDra/CVE-2021-31862/blob/main/README.md | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T23:10:30.768Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://www.sysaid.com/product/on-premise/latest-release" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://github.com/RobertDra/CVE-2021-31862/blob/main/README.md" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "descriptions": [ { "lang": "en", "value": "SysAid 20.4.74 allows XSS via the KeepAlive.jsp stamp parameter without any authentication." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2021-10-29T10:44:30", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://www.sysaid.com/product/on-premise/latest-release" }, { "tags": [ "x_refsource_MISC" ], "url": "https://github.com/RobertDra/CVE-2021-31862/blob/main/README.md" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2021-31862", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "SysAid 20.4.74 allows XSS via the KeepAlive.jsp stamp parameter without any authentication." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "https://www.sysaid.com/product/on-premise/latest-release", "refsource": "MISC", "url": "https://www.sysaid.com/product/on-premise/latest-release" }, { "name": "https://github.com/RobertDra/CVE-2021-31862/blob/main/README.md", "refsource": "MISC", "url": "https://github.com/RobertDra/CVE-2021-31862/blob/main/README.md" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2021-31862", "datePublished": "2021-10-29T10:44:30", "dateReserved": "2021-04-28T00:00:00", "dateUpdated": "2024-08-03T23:10:30.768Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-43972
Vulnerability from cvelistv5
Published
2022-01-11 19:19
Modified
2024-08-04 04:10
Severity ?
EPSS score ?
Summary
An unrestricted file copy vulnerability in /UserSelfServiceSettings.jsp in SysAid ITIL 20.4.74 b10 allows a remote authenticated attacker to copy arbitrary files on the server filesystem to the web root (with an arbitrary filename) via the tempFile and fileName parameters in the HTTP POST body.
References
▼ | URL | Tags |
---|---|---|
https://www.sysaid.com/it-service-management-software/incident-management | x_refsource_MISC | |
https://github.com/atredispartners/advisories/blob/master/ATREDIS-2021-0002.md | x_refsource_MISC | |
https://github.com/atredispartners/advisories/blob/master/ATREDIS-2022-0001.md | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T04:10:17.159Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://www.sysaid.com/it-service-management-software/incident-management" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://github.com/atredispartners/advisories/blob/master/ATREDIS-2021-0002.md" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://github.com/atredispartners/advisories/blob/master/ATREDIS-2022-0001.md" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "descriptions": [ { "lang": "en", "value": "An unrestricted file copy vulnerability in /UserSelfServiceSettings.jsp in SysAid ITIL 20.4.74 b10 allows a remote authenticated attacker to copy arbitrary files on the server filesystem to the web root (with an arbitrary filename) via the tempFile and fileName parameters in the HTTP POST body." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2022-01-11T19:19:23", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://www.sysaid.com/it-service-management-software/incident-management" }, { "tags": [ "x_refsource_MISC" ], "url": "https://github.com/atredispartners/advisories/blob/master/ATREDIS-2021-0002.md" }, { "tags": [ "x_refsource_MISC" ], "url": "https://github.com/atredispartners/advisories/blob/master/ATREDIS-2022-0001.md" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2021-43972", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "An unrestricted file copy vulnerability in /UserSelfServiceSettings.jsp in SysAid ITIL 20.4.74 b10 allows a remote authenticated attacker to copy arbitrary files on the server filesystem to the web root (with an arbitrary filename) via the tempFile and fileName parameters in the HTTP POST body." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "https://www.sysaid.com/it-service-management-software/incident-management", "refsource": "MISC", "url": "https://www.sysaid.com/it-service-management-software/incident-management" }, { "name": "https://github.com/atredispartners/advisories/blob/master/ATREDIS-2021-0002.md", "refsource": "MISC", "url": "https://github.com/atredispartners/advisories/blob/master/ATREDIS-2021-0002.md" }, { "name": "https://github.com/atredispartners/advisories/blob/master/ATREDIS-2022-0001.md", "refsource": "MISC", "url": "https://github.com/atredispartners/advisories/blob/master/ATREDIS-2022-0001.md" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2021-43972", "datePublished": "2022-01-11T19:19:23", "dateReserved": "2021-11-17T00:00:00", "dateUpdated": "2024-08-04T04:10:17.159Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-47246
Vulnerability from cvelistv5
Published
2023-11-10 00:00
Modified
2024-08-02 21:09
Severity ?
EPSS score ?
Summary
In SysAid On-Premise before 23.3.36, a path traversal vulnerability leads to code execution after an attacker writes a file to the Tomcat webroot, as exploited in the wild in November 2023.
References
{ "containers": { "adp": [ { "affected": [ { "cpes": [ "cpe:2.3:a:sysaid:sysaid_on-premises:*:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "sysaid_on-premises", "vendor": "sysaid", "versions": [ { "lessThan": "23.3.36", "status": "affected", "version": "0", "versionType": "custom" } ] } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" } }, { "other": { "content": { "id": "CVE-2023-47246", "options": [ { "Exploitation": "active" }, { "Automatable": "yes" }, { "Technical Impact": "total" } ], "role": "CISA Coordinator", "timestamp": "2024-04-06T04:00:38.286026Z", "version": "2.0.3" }, "type": "ssvc" } }, { "other": { "content": { "dateAdded": "2023-11-13", "reference": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog?search_api_fulltext=CVE-2023-47246" }, "type": "kev" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-22", "description": "CWE-22 Improper Limitation of a Pathname to a Restricted Directory (\u0027Path Traversal\u0027)", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-07-06T13:52:50.136Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" }, { "providerMetadata": { "dateUpdated": "2024-08-02T21:09:36.042Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://documentation.sysaid.com/docs/on-premise-security-enhancements-2023" }, { "tags": [ "x_transferred" ], "url": "https://www.sysaid.com/blog/service-desk/on-premise-software-security-vulnerability-notification" }, { "tags": [ "x_transferred" ], "url": "https://documentation.sysaid.com/docs/latest-version-installation-files" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "descriptions": [ { "lang": "en", "value": "In SysAid On-Premise before 23.3.36, a path traversal vulnerability leads to code execution after an attacker writes a file to the Tomcat webroot, as exploited in the wild in November 2023." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2023-11-10T05:42:44.754806", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "url": "https://documentation.sysaid.com/docs/on-premise-security-enhancements-2023" }, { "url": "https://www.sysaid.com/blog/service-desk/on-premise-software-security-vulnerability-notification" }, { "url": "https://documentation.sysaid.com/docs/latest-version-installation-files" } ] } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2023-47246", "datePublished": "2023-11-10T00:00:00", "dateReserved": "2023-11-04T00:00:00", "dateUpdated": "2024-08-02T21:09:36.042Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-33706
Vulnerability from cvelistv5
Published
2023-11-24 00:00
Modified
2024-08-02 15:47
Severity ?
EPSS score ?
Summary
SysAid before 23.2.15 allows Indirect Object Reference (IDOR) attacks to read ticket data via a modified sid parameter to EmailHtmlSourceIframe.jsp or a modified srID parameter to ShowMessage.jsp.
References
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T15:47:06.535Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://blog.pridesec.com.br/en/insecure-direct-object-reference-idor-affects-helpdesk-sysaid/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "descriptions": [ { "lang": "en", "value": "SysAid before 23.2.15 allows Indirect Object Reference (IDOR) attacks to read ticket data via a modified sid parameter to EmailHtmlSourceIframe.jsp or a modified srID parameter to ShowMessage.jsp." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2023-11-24T01:55:29.801050", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "url": "https://blog.pridesec.com.br/en/insecure-direct-object-reference-idor-affects-helpdesk-sysaid/" } ] } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2023-33706", "datePublished": "2023-11-24T00:00:00", "dateReserved": "2023-05-22T00:00:00", "dateUpdated": "2024-08-02T15:47:06.535Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-30049
Vulnerability from cvelistv5
Published
2021-07-22 11:54
Modified
2024-08-03 22:24
Severity ?
EPSS score ?
Summary
SysAid 20.3.64 b14 is affected by Cross Site Scripting (XSS) via a /KeepAlive.jsp?stamp= URI.
References
▼ | URL | Tags |
---|---|---|
https://eh337.net/2021/03/30/sysaid/ | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T22:24:59.103Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://eh337.net/2021/03/30/sysaid/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "descriptions": [ { "lang": "en", "value": "SysAid 20.3.64 b14 is affected by Cross Site Scripting (XSS) via a /KeepAlive.jsp?stamp= URI." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2021-07-22T11:54:48", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://eh337.net/2021/03/30/sysaid/" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2021-30049", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "SysAid 20.3.64 b14 is affected by Cross Site Scripting (XSS) via a /KeepAlive.jsp?stamp= URI." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "https://eh337.net/2021/03/30/sysaid/", "refsource": "MISC", "url": "https://eh337.net/2021/03/30/sysaid/" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2021-30049", "datePublished": "2021-07-22T11:54:48", "dateReserved": "2021-04-02T00:00:00", "dateUpdated": "2024-08-03T22:24:59.103Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2014-9436
Vulnerability from cvelistv5
Published
2015-01-02 19:00
Modified
2024-08-06 13:47
Severity ?
EPSS score ?
Summary
Absolute path traversal vulnerability in SysAid On-Premise before 14.4.2 allows remote attackers to read arbitrary files via a \\\\ (four backslashes) in the fileName parameter to getRdsLogFile.
References
▼ | URL | Tags |
---|---|---|
http://www.exploit-db.com/exploits/35593 | exploit, x_refsource_EXPLOIT-DB | |
https://exchange.xforce.ibmcloud.com/vulnerabilities/99456 | vdb-entry, x_refsource_XF | |
http://packetstormsecurity.com/files/129705/SysAid-Server-Arbitrary-File-Disclosure.html | x_refsource_MISC | |
http://seclists.org/fulldisclosure/2014/Dec/99 | mailing-list, x_refsource_FULLDISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T13:47:40.373Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "35593", "tags": [ "exploit", "x_refsource_EXPLOIT-DB", "x_transferred" ], "url": "http://www.exploit-db.com/exploits/35593" }, { "name": "sysaidserver-filename-dir-traversal(99456)", "tags": [ "vdb-entry", "x_refsource_XF", "x_transferred" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/99456" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://packetstormsecurity.com/files/129705/SysAid-Server-Arbitrary-File-Disclosure.html" }, { "name": "20141222 VP-2014-004 SysAid Server Arbitrary File Disclosure", "tags": [ "mailing-list", "x_refsource_FULLDISC", "x_transferred" ], "url": "http://seclists.org/fulldisclosure/2014/Dec/99" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2014-12-22T00:00:00", "descriptions": [ { "lang": "en", "value": "Absolute path traversal vulnerability in SysAid On-Premise before 14.4.2 allows remote attackers to read arbitrary files via a \\\\\\\\ (four backslashes) in the fileName parameter to getRdsLogFile." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2017-09-07T15:57:01", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "name": "35593", "tags": [ "exploit", "x_refsource_EXPLOIT-DB" ], "url": "http://www.exploit-db.com/exploits/35593" }, { "name": "sysaidserver-filename-dir-traversal(99456)", "tags": [ "vdb-entry", "x_refsource_XF" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/99456" }, { "tags": [ "x_refsource_MISC" ], "url": "http://packetstormsecurity.com/files/129705/SysAid-Server-Arbitrary-File-Disclosure.html" }, { "name": "20141222 VP-2014-004 SysAid Server Arbitrary File Disclosure", "tags": [ "mailing-list", "x_refsource_FULLDISC" ], "url": "http://seclists.org/fulldisclosure/2014/Dec/99" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2014-9436", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Absolute path traversal vulnerability in SysAid On-Premise before 14.4.2 allows remote attackers to read arbitrary files via a \\\\\\\\ (four backslashes) in the fileName parameter to getRdsLogFile." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "35593", "refsource": "EXPLOIT-DB", "url": "http://www.exploit-db.com/exploits/35593" }, { "name": "sysaidserver-filename-dir-traversal(99456)", "refsource": "XF", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/99456" }, { "name": "http://packetstormsecurity.com/files/129705/SysAid-Server-Arbitrary-File-Disclosure.html", "refsource": "MISC", "url": "http://packetstormsecurity.com/files/129705/SysAid-Server-Arbitrary-File-Disclosure.html" }, { "name": "20141222 VP-2014-004 SysAid Server Arbitrary File Disclosure", "refsource": "FULLDISC", "url": "http://seclists.org/fulldisclosure/2014/Dec/99" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2014-9436", "datePublished": "2015-01-02T19:00:00", "dateReserved": "2015-01-02T00:00:00", "dateUpdated": "2024-08-06T13:47:40.373Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2015-2999
Vulnerability from cvelistv5
Published
2015-06-08 14:00
Modified
2024-08-06 05:32
Severity ?
EPSS score ?
Summary
Multiple SQL injection vulnerabilities in SysAid Help Desk before 15.2 allow remote administrators to execute arbitrary SQL commands via the (1) groupFilter parameter in an AssetDetails report to /genericreport, customSQL parameter in a (2) TopAdministratorsByAverageTimer report or an (3) ActiveRequests report to /genericreport, (4) dir parameter to HelpDesk.jsp, or (5) grantSQL parameter to RFCGantt.jsp.
References
▼ | URL | Tags |
---|---|---|
http://seclists.org/fulldisclosure/2015/Jun/8 | mailing-list, x_refsource_FULLDISC | |
http://www.securityfocus.com/archive/1/535679/100/0/threaded | mailing-list, x_refsource_BUGTRAQ | |
http://packetstormsecurity.com/files/132138/SysAid-Help-Desk-14.4-Code-Execution-Denial-Of-Service-Traversal-SQL-Injection.html | x_refsource_MISC | |
http://www.securityfocus.com/bid/75038 | vdb-entry, x_refsource_BID | |
https://www.sysaid.com/blog/entry/sysaid-15-2-your-voice-your-service-desk | x_refsource_CONFIRM |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T05:32:21.287Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "20150603 [Multiple CVE\u0027s]: various critical vulnerabilities in SysAid Help Desk (RCE, file download, DoS, etc)", "tags": [ "mailing-list", "x_refsource_FULLDISC", "x_transferred" ], "url": "http://seclists.org/fulldisclosure/2015/Jun/8" }, { "name": "20150603 [Multiple CVE\u0027s]: various critical vulnerabilities in SysAid Help Desk (RCE, file download, DoS, etc)", "tags": [ "mailing-list", "x_refsource_BUGTRAQ", "x_transferred" ], "url": "http://www.securityfocus.com/archive/1/535679/100/0/threaded" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://packetstormsecurity.com/files/132138/SysAid-Help-Desk-14.4-Code-Execution-Denial-Of-Service-Traversal-SQL-Injection.html" }, { "name": "75038", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/75038" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://www.sysaid.com/blog/entry/sysaid-15-2-your-voice-your-service-desk" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2015-06-03T00:00:00", "descriptions": [ { "lang": "en", "value": "Multiple SQL injection vulnerabilities in SysAid Help Desk before 15.2 allow remote administrators to execute arbitrary SQL commands via the (1) groupFilter parameter in an AssetDetails report to /genericreport, customSQL parameter in a (2) TopAdministratorsByAverageTimer report or an (3) ActiveRequests report to /genericreport, (4) dir parameter to HelpDesk.jsp, or (5) grantSQL parameter to RFCGantt.jsp." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2018-10-09T18:57:01", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "name": "20150603 [Multiple CVE\u0027s]: various critical vulnerabilities in SysAid Help Desk (RCE, file download, DoS, etc)", "tags": [ "mailing-list", "x_refsource_FULLDISC" ], "url": "http://seclists.org/fulldisclosure/2015/Jun/8" }, { "name": "20150603 [Multiple CVE\u0027s]: various critical vulnerabilities in SysAid Help Desk (RCE, file download, DoS, etc)", "tags": [ "mailing-list", "x_refsource_BUGTRAQ" ], "url": "http://www.securityfocus.com/archive/1/535679/100/0/threaded" }, { "tags": [ "x_refsource_MISC" ], "url": "http://packetstormsecurity.com/files/132138/SysAid-Help-Desk-14.4-Code-Execution-Denial-Of-Service-Traversal-SQL-Injection.html" }, { "name": "75038", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/75038" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://www.sysaid.com/blog/entry/sysaid-15-2-your-voice-your-service-desk" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2015-2999", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Multiple SQL injection vulnerabilities in SysAid Help Desk before 15.2 allow remote administrators to execute arbitrary SQL commands via the (1) groupFilter parameter in an AssetDetails report to /genericreport, customSQL parameter in a (2) TopAdministratorsByAverageTimer report or an (3) ActiveRequests report to /genericreport, (4) dir parameter to HelpDesk.jsp, or (5) grantSQL parameter to RFCGantt.jsp." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "20150603 [Multiple CVE\u0027s]: various critical vulnerabilities in SysAid Help Desk (RCE, file download, DoS, etc)", "refsource": "FULLDISC", "url": "http://seclists.org/fulldisclosure/2015/Jun/8" }, { "name": "20150603 [Multiple CVE\u0027s]: various critical vulnerabilities in SysAid Help Desk (RCE, file download, DoS, etc)", "refsource": "BUGTRAQ", "url": "http://www.securityfocus.com/archive/1/535679/100/0/threaded" }, { "name": "http://packetstormsecurity.com/files/132138/SysAid-Help-Desk-14.4-Code-Execution-Denial-Of-Service-Traversal-SQL-Injection.html", "refsource": "MISC", "url": "http://packetstormsecurity.com/files/132138/SysAid-Help-Desk-14.4-Code-Execution-Denial-Of-Service-Traversal-SQL-Injection.html" }, { "name": "75038", "refsource": "BID", "url": "http://www.securityfocus.com/bid/75038" }, { "name": "https://www.sysaid.com/blog/entry/sysaid-15-2-your-voice-your-service-desk", "refsource": "CONFIRM", "url": "https://www.sysaid.com/blog/entry/sysaid-15-2-your-voice-your-service-desk" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2015-2999", "datePublished": "2015-06-08T14:00:00", "dateReserved": "2015-04-07T00:00:00", "dateUpdated": "2024-08-06T05:32:21.287Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }