First published: Tue Oct 25 2022(Updated: )
A vulnerability in the MiCollab Client server component of Mitel MiCollab through 9.5.0.101 could allow an authenticated attacker to conduct a Server-Side Request Forgery (SSRF) attack due to insufficient restriction of URL parameters. A successful exploit could allow an attacker to leverage connections and permissions available to the host server.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Mitel MiCollab | <=9.5.0.101 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of CVE-2022-36451 is high with a score of 8.8.
An authenticated attacker can exploit CVE-2022-36451 by conducting a Server-Side Request Forgery (SSRF) attack due to insufficient restriction of URL parameters.
The affected software for CVE-2022-36451 is Mitel MiCollab through version 9.5.0.101.
You can find more information about CVE-2022-36451 on Mitel's official support page or the Mitel Product Security Advisory 22-0006.
The CWE ID for CVE-2022-36451 is 918.