First published: Fri Aug 05 2022(Updated: )
VMware Workspace ONE Access, Identity Manager and vRealize Automation contain a reflected cross-site scripting (XSS) vulnerability. Due to improper user input sanitization, a malicious actor with some user interaction may be able to inject javascript code in the target user's window.
Credit: security@vmware.com
Affected Software | Affected Version | How to fix |
---|---|---|
VMware Identity Manager | =3.3.4 | |
VMware Identity Manager | =3.3.5 | |
VMware Identity Manager | =3.3.6 | |
Vmware One Access | =21.08.0.0 | |
Vmware One Access | =21.08.0.1 | |
Linux Linux kernel | ||
Vmware Access Connector | =21.08.0.0 | |
Vmware Access Connector | =21.08.0.1 | |
Vmware Access Connector | =22.05 | |
Vmware Identity Manager Connector | =3.3.4 | |
Vmware Identity Manager Connector | =3.3.5 | |
Vmware Identity Manager Connector | =3.3.6 | |
Vmware Identity Manager Connector | =19.03.0.1 | |
Microsoft Windows |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2022-31663 is a reflected cross-site scripting (XSS) vulnerability found in VMware Workspace ONE Access, Identity Manager, and vRealize Automation.
The severity of CVE-2022-31663 is medium, with a CVSS score of 6.1.
VMware Identity Manager versions 3.3.4, 3.3.5, and 3.3.6, VMware One Access versions 21.08.0.0 and 21.08.0.1, and VMware Access Connector versions 21.08.0.0, 21.08.0.1, and 22.05 are affected by CVE-2022-31663.
CVE-2022-31663 allows a malicious actor with some user interaction to inject JavaScript code in the target user's window.
More information about CVE-2022-31663 can be found in the VMware Security Advisory VMSA-2022-0021.