First published: Mon Jul 04 2022(Updated: )
Cross-site scripting vulnerability in Scheduler of Cybozu Garoon 4.10.0 to 5.5.1 allows a remote authenticated attacker with an administrative privilege to execute an arbitrary script.
Credit: vultures@jpcert.or.jp
Affected Software | Affected Version | How to fix |
---|---|---|
Cybozu Garoon | >=4.10.0<=5.5.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of CVE-2022-29513 is medium with a CVSS base score of 4.8.
The affected software version range for CVE-2022-29513 is Cybozu Garoon 4.10.0 to 5.5.1.
CVE-2022-29513 allows a remote authenticated attacker with administrative privilege to execute arbitrary scripts in the Scheduler of Cybozu Garoon.
The cross-site scripting vulnerability in Cybozu Garoon can be exploited by an attacker with administrative privilege by injecting malicious scripts through the Scheduler.
Yes, you can find more information about CVE-2022-29513 at the following references: - [Cybozu Security Advisory](https://cs.cybozu.co.jp/2022/007429.html) - [JVN](https://jvn.jp/en/jp/JVN73897863/index.html)