First published: Mon Jul 25 2022(Updated: )
Dell EMC Data Protection Advisor versions 19.6 and earlier, contains a Stored Cross Site Scripting, an attacker could potentially exploit this vulnerability, leading to the storage of malicious HTML or JavaScript codes in a trusted application data store. When a victim user accesses the data store through their browsers, the malicious code gets executed by the web browser in the context of the vulnerable web application. Exploitation may lead to information disclosure, session theft, or client-side request forgery.
Credit: security_alert@emc.com
Affected Software | Affected Version | How to fix |
---|---|---|
Dell EMC Data Protection Advisor | <=19.6 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of CVE-2022-33935 is medium with a CVSS score of 5.4.
CVE-2022-33935 affects Dell EMC Data Protection Advisor versions 19.6 and earlier.
CVE-2022-33935 is a Stored Cross Site Scripting (XSS) vulnerability.
An attacker can exploit CVE-2022-33935 by storing malicious HTML or JavaScript codes in a trusted application data store and tricking a victim user into accessing it.
Yes, Dell EMC has released a security update to address the Stored Cross Site Scripting vulnerability in Data Protection Advisor. Please refer to Dell's support website for more information.