Vulnerability Name: | CVE-2022-1996 (CCN-228317) |
Assigned: | 2022-03-07 |
Published: | 2022-03-07 |
Updated: | 2023-02-23 |
Summary: | go-restful could allow a remote attacker to bypass security restrictions, caused by improper regular expression implementation in the CORS Filter feature. By sending a specially-crafted request using the AllowedDomains parameter, an attacker could exploit this vulnerability to break CORS policy and allow any page to make requests. |
CVSS v3 Severity: | 9.1 Critical (CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N) 7.9 High (Temporal CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N/E:U/RL:O/RC:C)Exploitability Metrics: | Attack Vector (AV): Network Attack Complexity (AC): Low Privileges Required (PR): None User Interaction (UI): None | Scope: | Scope (S): Unchanged
| Impact Metrics: | Confidentiality (C): High Integrity (I): High Availibility (A): None | 9.3 Critical (CCN CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:N) 8.1 High (CCN Temporal CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:N/E:U/RL:O/RC:C)Exploitability Metrics: | Attack Vector (AV): Network Attack Complexity (AC): Low Privileges Required (PR): None User Interaction (UI): Required | Scope: | Scope (S): Changed
| Impact Metrics: | Confidentiality (C): High Integrity (I): High Availibility (A): None |
|
CVSS v2 Severity: | 6.4 Medium (CVSS v2 Vector: AV:N/AC:L/Au:N/C:P/I:P/A:N)Exploitability Metrics: | Access Vector (AV): Network Access Complexity (AC): Low Authentication (Au): None | Impact Metrics: | Confidentiality (C): Partial Integrity (I): Partial Availibility (A): None | 8.5 High (CCN CVSS v2 Vector: AV:N/AC:L/Au:S/C:C/I:C/A:N)Exploitability Metrics: | Access Vector (AV): Network Access Complexity (AC): Low Athentication (Au): Single_Instance
| Impact Metrics: | Confidentiality (C): Complete Integrity (I): Complete Availibility (A): None |
|
Vulnerability Consequences: | Bypass Security |
References: | Source: MITRE Type: CNA CVE-2022-1996
Source: XF Type: UNKNOWN gorestful-cve20221996-sec-bypass(228317)
Source: CCN Type: go-restful GIT Repository use exact matching of allowed domain entries, issue #489 (#493)
Source: security@huntr.dev Type: Patch, Third Party Advisory security@huntr.dev
Source: security@huntr.dev Type: Exploit, Patch, Third Party Advisory security@huntr.dev
Source: CCN Type: huntr Web site Authorization Bypass Through User-Controlled Key in emicklei/go-restful
Source: security@huntr.dev Type: Mailing List, Third Party Advisory security@huntr.dev
Source: security@huntr.dev Type: Mailing List, Third Party Advisory security@huntr.dev
Source: security@huntr.dev Type: Mailing List, Third Party Advisory security@huntr.dev
Source: security@huntr.dev Type: UNKNOWN security@huntr.dev
Source: security@huntr.dev Type: UNKNOWN security@huntr.dev
Source: security@huntr.dev Type: Mailing List, Third Party Advisory security@huntr.dev
Source: security@huntr.dev Type: UNKNOWN security@huntr.dev
Source: security@huntr.dev Type: Mailing List, Third Party Advisory security@huntr.dev
Source: security@huntr.dev Type: Third Party Advisory security@huntr.dev
Source: CCN Type: IBM Security Bulletin 6853463 (Robotic Process Automation for Cloud Pak) Multiple Security Vulnerabilities may affect IBM Robotic Process Automation for Cloud Pak.
Source: CCN Type: IBM Security Bulletin 6854977 (Cloud Pak for Security) IBM Cloud Pak for Security includes components with multiple known vulnerabilities
|
Vulnerable Configuration: | Configuration CCN 1: cpe:/a:ibm:robotic_process_automation_for_cloud_pak:21.0.1:*:*:*:*:*:*:*OR cpe:/a:ibm:robotic_process_automation_for_cloud_pak:21.0.2:*:*:*:*:*:*:*OR cpe:/a:ibm:robotic_process_automation_for_cloud_pak:21.0.3:*:*:*:*:*:*:*OR cpe:/a:ibm:cloud_pak_for_security:1.10.0.0:*:*:*:*:*:*:*OR cpe:/a:ibm:robotic_process_automation_for_cloud_pak:21.0.5:*:*:*:*:*:*:*OR cpe:/a:ibm:robotic_process_automation_for_cloud_pak:21.0.4:*:*:*:*:*:*:*
Denotes that component is vulnerable |
Oval Definitions |
Definition ID | Class | Title | Last Modified |
---|
oval:org.opensuse.security:def:7851 | P | containerized-data-importer-manifests-1.55.0-150500.4.4 on GA media (Moderate) | 2023-06-12 | oval:org.opensuse.security:def:7856 | P | helm-3.11.2-150000.1.21.1 on GA media (Moderate) | 2023-06-12 | oval:org.opensuse.security:def:7860 | P | kubevirt-manifests-0.58.0-150500.6.3 on GA media (Moderate) | 2023-06-12 | oval:org.opensuse.security:def:773 | P | Security update for kubevirt, virt-api-container, virt-controller-container, virt-handler-container, virt-launcher-container, virt-libguestfs-tools-container, virt-operator-container (Important) | 2022-09-22 | oval:org.opensuse.security:def:774 | P | Security update for cdi-apiserver-container, cdi-cloner-container, cdi-controller-container, cdi-importer-container, cdi-operator-container, cdi-uploadproxy-container, cdi-uploadserver-container, containerized-data-importer (Important) | 2022-09-22 | oval:org.opensuse.security:def:588 | P | Security update for helm (Important) (in QA) | 2022-09-21 | oval:org.opensuse.security:def:422 | P | Security update for trivy (Moderate) | 2022-08-06 |
|
BACK |