First published: Fri Jan 27 2023(Updated: )
Italtel NetMatch-S CI 5.2.0-20211008 allows Multiple Reflected/Stored XSS issues under NMSCIWebGui/j_security_check via the j_username parameter, or NMSCIWebGui/actloglineview.jsp via the name or actLine parameter. An attacker leveraging this vulnerability could inject arbitrary JavaScript. The payload would then be triggered every time an authenticated user browses the page containing it.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Italtel NetMatch-S CI | =5.2.0-20211008 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of CVE-2022-39813 is considered high due to its potential for remote code execution via XSS attacks.
To fix CVE-2022-39813, update the Italtel NetMatch-S CI software to the latest version that addresses this vulnerability.
The potential risks include unauthorized access to user data and the ability for attackers to execute arbitrary JavaScript in the context of authenticated users.
CVE-2022-39813 affects Italtel NetMatch-S CI version 5.2.0-20211008.
Yes, CVE-2022-39813 can be exploited remotely, allowing attackers to execute XSS attacks from an external location.