CVE-2022-22795 (GCVE-0-2022-22795)

Vulnerability from cvelistv5 – Published: 2022-03-09 14:56 – Updated: 2024-09-17 04:19
VLAI?
Title
Signiant - Manager+Agents XML External Entity (XXE)
Summary
Signiant - Manager+Agents XML External Entity (XXE) - Extract internal files of the affected machine An attacker can read all the system files, the product is running with root on Linux systems and nt/authority on windows systems, which allows him to access and extract any file on the systems, such as passwd, shadow, hosts and so on. By gaining access to these files, attackers can steal sensitive information from the victims machine.
CWE
  • CWE-611 - Improper Restriction of XML External Entity Reference ('XXE')
Assigner
References
Impacted products
Vendor Product Version
Signiant Signiant Affected: Signiant Build 78045 13.5.0
Affected: Signiant Build 79008,14.0.0
Affected: Signiant Build 79687 14.1.0
Affected: Signiant Build 79687 15.0.0
Create a notification for this product.
Date Public ?
2022-03-02 00:00
Credits
Anton Golotin
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-03T03:21:49.114Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "https://www.gov.il/en/departments/faq/cve_advisories"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "Signiant",
          "vendor": "Signiant",
          "versions": [
            {
              "status": "affected",
              "version": "Signiant  Build 78045 13.5.0"
            },
            {
              "status": "affected",
              "version": "Signiant  Build 79008,14.0.0"
            },
            {
              "status": "affected",
              "version": "Signiant  Build 79687 14.1.0"
            },
            {
              "status": "affected",
              "version": "Signiant  Build 79687 15.0.0"
            }
          ]
        }
      ],
      "credits": [
        {
          "lang": "en",
          "value": "Anton Golotin"
        }
      ],
      "datePublic": "2022-03-02T00:00:00.000Z",
      "descriptions": [
        {
          "lang": "en",
          "value": "Signiant - Manager+Agents XML External Entity (XXE) - Extract internal files of the affected machine An attacker can read all the system files, the product is running with root on Linux systems and nt/authority on windows systems, which allows him to access and extract any file on the systems, such as passwd, shadow, hosts and so on. By gaining access to these files, attackers can steal sensitive information from the victims machine."
        }
      ],
      "metrics": [
        {
          "cvssV3_1": {
            "attackComplexity": "HIGH",
            "attackVector": "PHYSICAL",
            "availabilityImpact": "HIGH",
            "baseScore": 6.8,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "HIGH",
            "scope": "CHANGED",
            "userInteraction": "REQUIRED",
            "vectorString": "CVSS:3.1/AV:P/AC:H/PR:H/UI:R/S:C/C:H/I:H/A:H",
            "version": "3.1"
          }
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "cweId": "CWE-611",
              "description": "CWE-611 Improper Restriction of XML External Entity Reference (\u0027XXE\u0027)",
              "lang": "en",
              "type": "CWE"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2022-03-09T14:56:32.000Z",
        "orgId": "a57ee1ae-c9c1-4f40-aa7b-cf10760fde3f",
        "shortName": "INCD"
      },
      "references": [
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "https://www.gov.il/en/departments/faq/cve_advisories"
        }
      ],
      "solutions": [
        {
          "lang": "en",
          "value": "All of 13.5, 14.1, and 15.1 have an update available.\nThe mitigation involved adding a filter that validates for external dtd."
        }
      ],
      "source": {
        "advisory": "ILVN-2022-0016",
        "defect": [
          "ILVN-2022-0016"
        ],
        "discovery": "EXTERNAL"
      },
      "title": "Signiant - Manager+Agents XML External Entity (XXE)",
      "x_generator": {
        "engine": "Vulnogram 0.0.9"
      },
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cna@cyber.gov.il",
          "DATE_PUBLIC": "2022-03-02T16:21:00.000Z",
          "ID": "CVE-2022-22795",
          "STATE": "PUBLIC",
          "TITLE": "Signiant - Manager+Agents XML External Entity (XXE)"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "Signiant",
                      "version": {
                        "version_data": [
                          {
                            "version_name": "Signiant",
                            "version_value": "Build 78045 13.5.0"
                          },
                          {
                            "version_name": "Signiant",
                            "version_value": "Build 79008,14.0.0"
                          },
                          {
                            "version_name": "Signiant",
                            "version_value": "Build 79687 14.1.0"
                          },
                          {
                            "version_name": "Signiant",
                            "version_value": "Build 79687 15.0.0"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "Signiant"
              }
            ]
          }
        },
        "credit": [
          {
            "lang": "eng",
            "value": "Anton Golotin"
          }
        ],
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Signiant - Manager+Agents XML External Entity (XXE) - Extract internal files of the affected machine An attacker can read all the system files, the product is running with root on Linux systems and nt/authority on windows systems, which allows him to access and extract any file on the systems, such as passwd, shadow, hosts and so on. By gaining access to these files, attackers can steal sensitive information from the victims machine."
            }
          ]
        },
        "generator": {
          "engine": "Vulnogram 0.0.9"
        },
        "impact": {
          "cvss": {
            "attackComplexity": "HIGH",
            "attackVector": "PHYSICAL",
            "availabilityImpact": "HIGH",
            "baseScore": 6.8,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "HIGH",
            "scope": "CHANGED",
            "userInteraction": "REQUIRED",
            "vectorString": "CVSS:3.1/AV:P/AC:H/PR:H/UI:R/S:C/C:H/I:H/A:H",
            "version": "3.1"
          }
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "CWE-611 Improper Restriction of XML External Entity Reference (\u0027XXE\u0027)"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "https://www.gov.il/en/departments/faq/cve_advisories",
              "refsource": "MISC",
              "url": "https://www.gov.il/en/departments/faq/cve_advisories"
            }
          ]
        },
        "solution": [
          {
            "lang": "en",
            "value": "All of 13.5, 14.1, and 15.1 have an update available.\nThe mitigation involved adding a filter that validates for external dtd."
          }
        ],
        "source": {
          "advisory": "ILVN-2022-0016",
          "defect": [
            "ILVN-2022-0016"
          ],
          "discovery": "EXTERNAL"
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "a57ee1ae-c9c1-4f40-aa7b-cf10760fde3f",
    "assignerShortName": "INCD",
    "cveId": "CVE-2022-22795",
    "datePublished": "2022-03-09T14:56:32.876Z",
    "dateReserved": "2022-01-07T00:00:00.000Z",
    "dateUpdated": "2024-09-17T04:19:02.100Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1",
  "vulnerability-lookup:meta": {
    "epss": {
      "cve": "CVE-2022-22795",
      "date": "2026-04-25",
      "epss": "0.00244",
      "percentile": "0.47707"
    },
    "fkie_nvd": {
      "configurations": "[{\"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:signiant:manager\\\\+agents:*:*:*:*:*:*:*:*\", \"versionEndExcluding\": \"13.5\", \"matchCriteriaId\": \"19B2527F-AF1D-4272-A9C4-CD495E2F2F0C\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:signiant:manager\\\\+agents:14.0:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"90B2CEC8-2A06-46AD-A9F7-208CBAE18B95\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:signiant:manager\\\\+agents:15.0:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"92D6242F-F050-43D3-966D-0A77ED55520C\"}]}]}]",
      "descriptions": "[{\"lang\": \"en\", \"value\": \"Signiant - Manager+Agents XML External Entity (XXE) - Extract internal files of the affected machine An attacker can read all the system files, the product is running with root on Linux systems and nt/authority on windows systems, which allows him to access and extract any file on the systems, such as passwd, shadow, hosts and so on. By gaining access to these files, attackers can steal sensitive information from the victims machine.\"}, {\"lang\": \"es\", \"value\": \"Signiant - Manager+Agents un ataque de tipo XML External Entity (XXE) - Extraer archivos internos de la m\\u00e1quina afectada Un atacante puede leer todos los archivos del sistema, el producto es ejecutado con root en sistemas Linux y nt/authority en sistemas Windows, lo que le permite acceder y extraer cualquier archivo de los sistemas, como passwd, shadow, hosts, etc. Al conseguir acceso a estos archivos, los atacantes pueden robar informaci\\u00f3n confidencial de la m\\u00e1quina de las v\\u00edctimas\"}]",
      "id": "CVE-2022-22795",
      "lastModified": "2024-11-21T06:47:28.150",
      "metrics": "{\"cvssMetricV31\": [{\"source\": \"cna@cyber.gov.il\", \"type\": \"Secondary\", \"cvssData\": {\"version\": \"3.1\", \"vectorString\": \"CVSS:3.1/AV:P/AC:H/PR:H/UI:R/S:C/C:H/I:H/A:H\", \"baseScore\": 6.8, \"baseSeverity\": \"MEDIUM\", \"attackVector\": \"PHYSICAL\", \"attackComplexity\": \"HIGH\", \"privilegesRequired\": \"HIGH\", \"userInteraction\": \"REQUIRED\", \"scope\": \"CHANGED\", \"confidentialityImpact\": \"HIGH\", \"integrityImpact\": \"HIGH\", \"availabilityImpact\": \"HIGH\"}, \"exploitabilityScore\": 0.2, \"impactScore\": 6.0}, {\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"cvssData\": {\"version\": \"3.1\", \"vectorString\": \"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H\", \"baseScore\": 9.1, \"baseSeverity\": \"CRITICAL\", \"attackVector\": \"NETWORK\", \"attackComplexity\": \"LOW\", \"privilegesRequired\": \"NONE\", \"userInteraction\": \"NONE\", \"scope\": \"UNCHANGED\", \"confidentialityImpact\": \"HIGH\", \"integrityImpact\": \"NONE\", \"availabilityImpact\": \"HIGH\"}, \"exploitabilityScore\": 3.9, \"impactScore\": 5.2}], \"cvssMetricV2\": [{\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"cvssData\": {\"version\": \"2.0\", \"vectorString\": \"AV:N/AC:L/Au:N/C:P/I:N/A:P\", \"baseScore\": 6.4, \"accessVector\": \"NETWORK\", \"accessComplexity\": \"LOW\", \"authentication\": \"NONE\", \"confidentialityImpact\": \"PARTIAL\", \"integrityImpact\": \"NONE\", \"availabilityImpact\": \"PARTIAL\"}, \"baseSeverity\": \"MEDIUM\", \"exploitabilityScore\": 10.0, \"impactScore\": 4.9, \"acInsufInfo\": false, \"obtainAllPrivilege\": false, \"obtainUserPrivilege\": false, \"obtainOtherPrivilege\": false, \"userInteractionRequired\": false}]}",
      "published": "2022-03-10T17:45:37.500",
      "references": "[{\"url\": \"https://www.gov.il/en/departments/faq/cve_advisories\", \"source\": \"cna@cyber.gov.il\", \"tags\": [\"Third Party Advisory\"]}, {\"url\": \"https://www.gov.il/en/departments/faq/cve_advisories\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Third Party Advisory\"]}]",
      "sourceIdentifier": "cna@cyber.gov.il",
      "vulnStatus": "Modified",
      "weaknesses": "[{\"source\": \"cna@cyber.gov.il\", \"type\": \"Secondary\", \"description\": [{\"lang\": \"en\", \"value\": \"CWE-611\"}]}, {\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"description\": [{\"lang\": \"en\", \"value\": \"CWE-611\"}]}]"
    },
    "nvd": "{\"cve\":{\"id\":\"CVE-2022-22795\",\"sourceIdentifier\":\"cna@cyber.gov.il\",\"published\":\"2022-03-10T17:45:37.500\",\"lastModified\":\"2024-11-21T06:47:28.150\",\"vulnStatus\":\"Modified\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"Signiant - Manager+Agents XML External Entity (XXE) - Extract internal files of the affected machine An attacker can read all the system files, the product is running with root on Linux systems and nt/authority on windows systems, which allows him to access and extract any file on the systems, such as passwd, shadow, hosts and so on. By gaining access to these files, attackers can steal sensitive information from the victims machine.\"},{\"lang\":\"es\",\"value\":\"Signiant - Manager+Agents un ataque de tipo XML External Entity (XXE) - Extraer archivos internos de la m\u00e1quina afectada Un atacante puede leer todos los archivos del sistema, el producto es ejecutado con root en sistemas Linux y nt/authority en sistemas Windows, lo que le permite acceder y extraer cualquier archivo de los sistemas, como passwd, shadow, hosts, etc. Al conseguir acceso a estos archivos, los atacantes pueden robar informaci\u00f3n confidencial de la m\u00e1quina de las v\u00edctimas\"}],\"metrics\":{\"cvssMetricV31\":[{\"source\":\"cna@cyber.gov.il\",\"type\":\"Secondary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:P/AC:H/PR:H/UI:R/S:C/C:H/I:H/A:H\",\"baseScore\":6.8,\"baseSeverity\":\"MEDIUM\",\"attackVector\":\"PHYSICAL\",\"attackComplexity\":\"HIGH\",\"privilegesRequired\":\"HIGH\",\"userInteraction\":\"REQUIRED\",\"scope\":\"CHANGED\",\"confidentialityImpact\":\"HIGH\",\"integrityImpact\":\"HIGH\",\"availabilityImpact\":\"HIGH\"},\"exploitabilityScore\":0.2,\"impactScore\":6.0},{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H\",\"baseScore\":9.1,\"baseSeverity\":\"CRITICAL\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"NONE\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"HIGH\",\"integrityImpact\":\"NONE\",\"availabilityImpact\":\"HIGH\"},\"exploitabilityScore\":3.9,\"impactScore\":5.2}],\"cvssMetricV2\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"2.0\",\"vectorString\":\"AV:N/AC:L/Au:N/C:P/I:N/A:P\",\"baseScore\":6.4,\"accessVector\":\"NETWORK\",\"accessComplexity\":\"LOW\",\"authentication\":\"NONE\",\"confidentialityImpact\":\"PARTIAL\",\"integrityImpact\":\"NONE\",\"availabilityImpact\":\"PARTIAL\"},\"baseSeverity\":\"MEDIUM\",\"exploitabilityScore\":10.0,\"impactScore\":4.9,\"acInsufInfo\":false,\"obtainAllPrivilege\":false,\"obtainUserPrivilege\":false,\"obtainOtherPrivilege\":false,\"userInteractionRequired\":false}]},\"weaknesses\":[{\"source\":\"cna@cyber.gov.il\",\"type\":\"Secondary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-611\"}]},{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-611\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:signiant:manager\\\\+agents:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"13.5\",\"matchCriteriaId\":\"19B2527F-AF1D-4272-A9C4-CD495E2F2F0C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:signiant:manager\\\\+agents:14.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"90B2CEC8-2A06-46AD-A9F7-208CBAE18B95\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:signiant:manager\\\\+agents:15.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"92D6242F-F050-43D3-966D-0A77ED55520C\"}]}]}],\"references\":[{\"url\":\"https://www.gov.il/en/departments/faq/cve_advisories\",\"source\":\"cna@cyber.gov.il\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://www.gov.il/en/departments/faq/cve_advisories\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]}]}}"
  }
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or observed by the user.
  • Confirmed: The vulnerability has been validated from an analyst's perspective.
  • Published Proof of Concept: A public proof of concept is available for this vulnerability.
  • Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
  • Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
  • Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
  • Not confirmed: The user expressed doubt about the validity of the vulnerability.
  • Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.


Loading…

Detection rules are retrieved from Rulezet.

Loading…

Loading…