Webswing up to 20.1.15/20.2.18/21.1.7/21.2.11/22.1.2 Header X-Forwarded-For injection
CVSS Meta Temp Score | Current Exploit Price (≈) | CTI Interest Score |
---|---|---|
7.5 | $0-$5k | 0.00 |
A vulnerability was found in Webswing up to 20.1.15/20.2.18/21.1.7/21.2.11/22.1.2. It has been declared as critical. This vulnerability affects an unknown part of the component Header Handler. The manipulation of the argument X-Forwarded-For
with an unknown input leads to a injection vulnerability. The CWE definition for the vulnerability is CWE-74. The product constructs all or part of a command, data structure, or record using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify how it is parsed or interpreted when it is sent to a downstream component. As an impact it is known to affect confidentiality, integrity, and availability. CVE summarizes:
Webswing before 22.1.3 allows X-Forwarded-For header injection. The client IP address is associated with a variable in the configuration page. The {clientIp} variable can be used as an application startup argument. The X-Forwarded-For header can be manipulated by a client to store an arbitrary value that is used to replace the clientIp variable (without sanitization). A client can thus inject multiple arguments into the session startup. Systems that do not use the clientIP variable in the configuration are not vulnerable. The vulnerability is fixed in these versions: 20.1.16, 20.2.19, 21.1.8, 21.2.12, and 22.1.3.
The weakness was released 07/09/2022. The advisory is shared for download at webswing.org. This vulnerability was named CVE-2022-34914 since 07/02/2022. There are known technical details, but no exploit is available. The MITRE ATT&CK project declares the attack technique as T1055.
Upgrading to version 20.1.16, 20.2.19, 21.1.8, 21.2.12 or 22.1.3 eliminates this vulnerability.
Product
Name
Version
- 20.1.0
- 20.1.1
- 20.1.2
- 20.1.3
- 20.1.4
- 20.1.5
- 20.1.6
- 20.1.7
- 20.1.8
- 20.1.9
- 20.1.10
- 20.1.11
- 20.1.12
- 20.1.13
- 20.1.14
- 20.1.15
- 20.2.0
- 20.2.1
- 20.2.2
- 20.2.3
- 20.2.4
- 20.2.5
- 20.2.6
- 20.2.7
- 20.2.8
- 20.2.9
- 20.2.10
- 20.2.11
- 20.2.12
- 20.2.13
- 20.2.14
- 20.2.15
- 20.2.16
- 20.2.17
- 20.2.18
- 21.1.0
- 21.1.1
- 21.1.2
- 21.1.3
- 21.1.4
- 21.1.5
- 21.1.6
- 21.1.7
- 21.2.0
- 21.2.1
- 21.2.2
- 21.2.3
- 21.2.4
- 21.2.5
- 21.2.6
- 21.2.7
- 21.2.8
- 21.2.9
- 21.2.10
- 21.2.11
- 22.1.0
- 22.1.1
- 22.1.2
CPE 2.3
CPE 2.2
CVSSv4
VulDB CVSS-B Score: 🔍VulDB CVSS-BT Score: 🔍
VulDB Vector: 🔍
VulDB Reliability: 🔍
CVSSv3
VulDB Meta Base Score: 7.6VulDB Meta Temp Score: 7.5
VulDB Base Score: 5.5
VulDB Temp Score: 5.3
VulDB Vector: 🔍
VulDB Reliability: 🔍
NVD Base Score: 9.8
NVD Vector: 🔍
CVSSv2
AV | AC | Au | C | I | A |
---|---|---|---|---|---|
💳 | 💳 | 💳 | 💳 | 💳 | 💳 |
💳 | 💳 | 💳 | 💳 | 💳 | 💳 |
💳 | 💳 | 💳 | 💳 | 💳 | 💳 |
Vector | Complexity | Authentication | Confidentiality | Integrity | Availability |
---|---|---|---|---|---|
unlock | unlock | unlock | unlock | unlock | unlock |
unlock | unlock | unlock | unlock | unlock | unlock |
unlock | unlock | unlock | unlock | unlock | unlock |
VulDB Base Score: 🔍
VulDB Temp Score: 🔍
VulDB Reliability: 🔍
NVD Base Score: 🔍
Exploiting
Class: InjectionCWE: CWE-74 / CWE-707
ATT&CK: T1055
Local: No
Remote: Partially
Availability: 🔍
Status: Not defined
EPSS Score: 🔍
EPSS Percentile: 🔍
Price Prediction: 🔍
Current Price Estimation: 🔍
0-Day | unlock | unlock | unlock | unlock |
---|---|---|---|---|
Today | unlock | unlock | unlock | unlock |
Threat Intelligence
Interest: 🔍Active Actors: 🔍
Active APT Groups: 🔍
Countermeasures
Recommended: UpgradeStatus: 🔍
0-Day Time: 🔍
Upgrade: Webswing 20.1.16/20.2.19/21.1.8/21.2.12/22.1.3
Timeline
07/02/2022 🔍07/09/2022 🔍
07/09/2022 🔍
07/20/2022 🔍
Sources
Advisory: webswing.orgStatus: Confirmed
CVE: CVE-2022-34914 (🔍)
Entry
Created: 07/09/2022 08:23Updated: 07/20/2022 14:11
Changes: 07/09/2022 08:23 (40), 07/20/2022 14:11 (18)
Complete: 🔍
No comments yet. Languages: en.
Please log in to comment.