First published: Thu May 12 2022(Updated: )
Sysaid – sysaid Open Redirect - An Attacker can change the redirect link at the parameter "redirectURL" from"GET" request from the url location: /CommunitySSORedirect.jsp?redirectURL=https://google.com. Unvalidated redirects and forwards are possible when a web application accepts untrusted input that could cause the web application to redirect the request to a URL contained within untrusted input. By modifying untrusted URL input to a malicious site, an attacker may successfully launch a phishing scam and steal user credentials.
Credit: cna@cyber.gov.il
Affected Software | Affected Version | How to fix |
---|---|---|
Sysaid On-Premises | <22.1.50 | |
Sysaid On-Premises | <22.1.64 |
Update to 22.1.50 cloud version, or to 22.1.64 on premise version.
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID for this Sysaid vulnerability is CVE-2022-22797.
The severity of CVE-2022-22797 is medium with a CVSS score of 6.1.
The affected software for CVE-2022-22797 is Sysaid version up to 22.1.50 (cloud) and up to 22.1.64 (on-premises).
An attacker can exploit CVE-2022-22797 by changing the redirect link at the 'redirectURL' parameter in a GET request.
CVE-2022-22797 poses a risk of unvalidated redirects and forwards, allowing attackers to redirect users to malicious websites.