First published: Fri Oct 28 2022(Updated: )
A stored cross-site scripting (XSS) vulnerability in the Global Variables feature (/index.php?module=global_vars/vars) of Rukovoditel v3.2.1 allows authenticated attackers to execute arbitrary web scripts or HTML via a crafted payload injected into the Value parameter after clicking "Create".
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Rukovoditel Rukovoditel | =3.2.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of CVE-2022-43165 is medium with a severity value of 5.4.
CVE-2022-43165 affects Rukovoditel version 3.2.1 and allows authenticated attackers to execute arbitrary web scripts or HTML through a crafted payload in the Global Variables feature.
As an attacker, you can exploit CVE-2022-43165 by injecting a crafted payload into the Value parameter after clicking 'Create' in the Global Variables feature of Rukovoditel version 3.2.1.
Currently, there is no official fix available for CVE-2022-43165. It is recommended to update to a newer version as soon as it becomes available.
You can find more information about CVE-2022-43165 in the GitHub issue linked [here](https://github.com/anhdq201/rukovoditel/issues/5).