Search criteria
12 vulnerabilities found for safeq by ysoft
FKIE_CVE-2022-23862
Vulnerability from fkie_nvd - Published: 2024-10-22 16:15 - Updated: 2024-10-30 21:21
Severity ?
7.8 (High) - CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
8.4 (High) - CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
8.4 (High) - CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Summary
A Local Privilege Escalation issue was discovered in Y Soft SAFEQ 6 Build 53. The SafeQ JMX service running on port 9696 is vulnerable to JMX MLet attacks. Because the service did not enforce authentication and was running under the "NT Authority\System" user, an attacker is able to use the vulnerability to execute arbitrary code and elevate to the system user.
References
| URL | Tags | ||
|---|---|---|---|
| cve@mitre.org | https://github.com/mbadanoiu/CVE-2022-23862 | Exploit, Third Party Advisory | |
| cve@mitre.org | https://github.com/mbadanoiu/CVE-2022-23862/blob/main/SafeQ%20-%20CVE-2022-23862.pdf | Exploit | |
| cve@mitre.org | https://ysoft.com | Product |
{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:ysoft:safeq:6.0:build53:*:*:*:*:*:*",
"matchCriteriaId": "ECE640BB-1291-40D3-A5BF-C60DF8074BC8",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A Local Privilege Escalation issue was discovered in Y Soft SAFEQ 6 Build 53. The SafeQ JMX service running on port 9696 is vulnerable to JMX MLet attacks. Because the service did not enforce authentication and was running under the \"NT Authority\\System\" user, an attacker is able to use the vulnerability to execute arbitrary code and elevate to the system user."
},
{
"lang": "es",
"value": " Se descubri\u00f3 un problema de escalada de privilegios locales en Y Soft SAFEQ 6 Build 53. El servicio JMX de SafeQ que se ejecuta en el puerto 9696 es vulnerable a ataques JMX MLet. Debido a que el servicio no aplicaba la autenticaci\u00f3n y se ejecutaba bajo el usuario \"NT Authority\\System\", un atacante puede usar la vulnerabilidad para ejecutar c\u00f3digo arbitrario y ascender al usuario del sistema."
}
],
"id": "CVE-2022-23862",
"lastModified": "2024-10-30T21:21:09.990",
"metrics": {
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"exploitabilityScore": 1.8,
"impactScore": 5.9,
"source": "nvd@nist.gov",
"type": "Primary"
},
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 8.4,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"exploitabilityScore": 2.5,
"impactScore": 5.9,
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary"
}
]
},
"published": "2024-10-22T16:15:05.443",
"references": [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://github.com/mbadanoiu/CVE-2022-23862"
},
{
"source": "cve@mitre.org",
"tags": [
"Exploit"
],
"url": "https://github.com/mbadanoiu/CVE-2022-23862/blob/main/SafeQ%20-%20CVE-2022-23862.pdf"
},
{
"source": "cve@mitre.org",
"tags": [
"Product"
],
"url": "https://ysoft.com"
}
],
"sourceIdentifier": "cve@mitre.org",
"vulnStatus": "Analyzed",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "CWE-306"
}
],
"source": "nvd@nist.gov",
"type": "Primary"
},
{
"description": [
{
"lang": "en",
"value": "CWE-306"
}
],
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary"
}
]
}
FKIE_CVE-2022-23861
Vulnerability from fkie_nvd - Published: 2024-10-22 16:15 - Updated: 2024-11-01 14:19
Severity ?
5.4 (Medium) - CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N
6.1 (Medium) - CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
6.1 (Medium) - CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
Summary
Multiple Stored Cross-Site Scripting vulnerabilities were discovered in Y Soft SAFEQ 6 Build 53. Multiple fields in the YSoft SafeQ web application can be used to inject malicious inputs that, due to a lack of output sanitization, result in the execution of arbitrary JS code. These fields can be leveraged to perform XSS attacks on legitimate users accessing the SafeQ web interface.
References
| URL | Tags | ||
|---|---|---|---|
| cve@mitre.org | https://github.com/mbadanoiu/CVE-2022-23861 | Exploit, Third Party Advisory | |
| cve@mitre.org | https://github.com/mbadanoiu/CVE-2022-23861/blob/main/SafeQ%20-%20CVE-2022-23861.pdf | Exploit | |
| cve@mitre.org | https://ysoft.com | Product |
{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:ysoft:safeq:6.0:build53:*:*:*:*:*:*",
"matchCriteriaId": "ECE640BB-1291-40D3-A5BF-C60DF8074BC8",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Multiple Stored Cross-Site Scripting vulnerabilities were discovered in Y Soft SAFEQ 6 Build 53. Multiple fields in the YSoft SafeQ web application can be used to inject malicious inputs that, due to a lack of output sanitization, result in the execution of arbitrary JS code. These fields can be leveraged to perform XSS attacks on legitimate users accessing the SafeQ web interface."
},
{
"lang": "es",
"value": " Se descubrieron m\u00faltiples vulnerabilidades de cross-site scripting almacenadas en Y Soft SAFEQ 6 Build 53. Se pueden usar varios campos en la aplicaci\u00f3n web YSoft SafeQ para inyectar entradas maliciosas que, debido a la falta de desinfecci\u00f3n de salida, dan como resultado la ejecuci\u00f3n de c\u00f3digo JS arbitrario. Estos campos se pueden aprovechar para realizar ataques XSS a usuarios leg\u00edtimos que acceden a la interfaz web de SafeQ."
}
],
"id": "CVE-2022-23861",
"lastModified": "2024-11-01T14:19:00.030",
"metrics": {
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 5.4,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"privilegesRequired": "LOW",
"scope": "CHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
"version": "3.1"
},
"exploitabilityScore": 2.3,
"impactScore": 2.7,
"source": "nvd@nist.gov",
"type": "Primary"
},
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 6.1,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"privilegesRequired": "NONE",
"scope": "CHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
"version": "3.1"
},
"exploitabilityScore": 2.8,
"impactScore": 2.7,
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary"
}
]
},
"published": "2024-10-22T16:15:04.897",
"references": [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://github.com/mbadanoiu/CVE-2022-23861"
},
{
"source": "cve@mitre.org",
"tags": [
"Exploit"
],
"url": "https://github.com/mbadanoiu/CVE-2022-23861/blob/main/SafeQ%20-%20CVE-2022-23861.pdf"
},
{
"source": "cve@mitre.org",
"tags": [
"Product"
],
"url": "https://ysoft.com"
}
],
"sourceIdentifier": "cve@mitre.org",
"vulnStatus": "Analyzed",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "CWE-79"
}
],
"source": "nvd@nist.gov",
"type": "Primary"
},
{
"description": [
{
"lang": "en",
"value": "CWE-79"
}
],
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary"
}
]
}
FKIE_CVE-2022-38176
Vulnerability from fkie_nvd - Published: 2022-09-06 21:15 - Updated: 2024-11-21 07:15
Severity ?
Summary
An issue was discovered in YSoft SAFEQ 6 before 6.0.72. Incorrect privileges were configured as part of the installer package for the Client V3 services, allowing for local user privilege escalation by overwriting the executable file via an alternative data stream. NOTE: this is not the same as CVE-2021-31859.
References
Impacted products
| Vendor | Product | Version | |
|---|---|---|---|
| ysoft | safeq | 6.0 | |
| ysoft | safeq | 6.0 | |
| ysoft | safeq | 6.0 | |
| ysoft | safeq | 6.0 | |
| ysoft | safeq | 6.0 | |
| ysoft | safeq | 6.0 | |
| ysoft | safeq | 6.0 | |
| ysoft | safeq | 6.0 | |
| ysoft | safeq | 6.0 | |
| ysoft | safeq | 6.0 | |
| ysoft | safeq | 6.0 | |
| ysoft | safeq | 6.0 | |
| ysoft | safeq | 6.0 | |
| ysoft | safeq | 6.0 | |
| ysoft | safeq | 6.0 | |
| ysoft | safeq | 6.0 | |
| ysoft | safeq | 6.0 | |
| ysoft | safeq | 6.0 | |
| ysoft | safeq | 6.0 | |
| ysoft | safeq | 6.0 | |
| ysoft | safeq | 6.0 | |
| ysoft | safeq | 6.0 | |
| ysoft | safeq | 6.0 | |
| ysoft | safeq | 6.0 | |
| ysoft | safeq | 6.0 | |
| ysoft | safeq | 6.0 | |
| ysoft | safeq | 6.0 | |
| ysoft | safeq | 6.0 | |
| ysoft | safeq | 6.0 | |
| ysoft | safeq | 6.0 | |
| ysoft | safeq | 6.0 | |
| ysoft | safeq | 6.0 | |
| ysoft | safeq | 6.0 | |
| ysoft | safeq | 6.0 | |
| ysoft | safeq | 6.0 | |
| ysoft | safeq | 6.0 | |
| ysoft | safeq | 6.0 | |
| ysoft | safeq | 6.0 | |
| ysoft | safeq | 6.0 | |
| ysoft | safeq | 6.0 | |
| ysoft | safeq | 6.0 |
{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:ysoft:safeq:6.0:-:*:*:*:*:*:*",
"matchCriteriaId": "EA81585C-2548-449C-B1BF-5288AF23E947",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:ysoft:safeq:6.0:build32:*:*:*:*:*:*",
"matchCriteriaId": "66F8714A-C098-4FB8-BF3C-966466B93CEF",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:ysoft:safeq:6.0:build33:*:*:*:*:*:*",
"matchCriteriaId": "A7E52155-DE90-492E-959A-339E1BE79683",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:ysoft:safeq:6.0:build34:*:*:*:*:*:*",
"matchCriteriaId": "9E53A361-E775-4B7C-B26F-5527EBB74EF8",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:ysoft:safeq:6.0:build35:*:*:*:*:*:*",
"matchCriteriaId": "DC1FB050-F460-43F3-9B08-51A79A93C9E1",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:ysoft:safeq:6.0:build36:*:*:*:*:*:*",
"matchCriteriaId": "09BF07DA-47F3-4002-B13B-90409C756476",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:ysoft:safeq:6.0:build37:*:*:*:*:*:*",
"matchCriteriaId": "70E37BAC-9AD5-4F9F-983B-B6AF7D798389",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:ysoft:safeq:6.0:build38:*:*:*:*:*:*",
"matchCriteriaId": "2FEBCEE6-8442-47DD-9417-DAFB90AE54B1",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:ysoft:safeq:6.0:build39:*:*:*:*:*:*",
"matchCriteriaId": "E4288C64-E6A4-4724-A991-834B0C7C629E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:ysoft:safeq:6.0:build40:*:*:*:*:*:*",
"matchCriteriaId": "4AECD471-134D-47B7-A35B-0C48659A9CAE",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:ysoft:safeq:6.0:build41:*:*:*:*:*:*",
"matchCriteriaId": "C7BDBDE0-105C-4140-B0EB-843BC8FFDDF7",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:ysoft:safeq:6.0:build42:*:*:*:*:*:*",
"matchCriteriaId": "A7A14715-0C5E-4648-9C8F-52356B11DA91",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:ysoft:safeq:6.0:build43:*:*:*:*:*:*",
"matchCriteriaId": "5F34F1CF-7388-4865-A708-BAEAFB46FDD1",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:ysoft:safeq:6.0:build44:*:*:*:*:*:*",
"matchCriteriaId": "5CAA458B-7E04-49F1-9431-B2452379A73C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:ysoft:safeq:6.0:build45:*:*:*:*:*:*",
"matchCriteriaId": "15173475-41B5-4AB6-BC7B-B0EAB027A2C3",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:ysoft:safeq:6.0:build46:*:*:*:*:*:*",
"matchCriteriaId": "5998894F-5F9E-46FB-9FE9-AA4233C51C48",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:ysoft:safeq:6.0:build47:*:*:*:*:*:*",
"matchCriteriaId": "D81E1C89-B437-4D53-BF47-89E86E4D8E3D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:ysoft:safeq:6.0:build48:*:*:*:*:*:*",
"matchCriteriaId": "EF786E8D-F04A-450E-9091-EFF3EF43124A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:ysoft:safeq:6.0:build49:*:*:*:*:*:*",
"matchCriteriaId": "8F2BB4C0-636B-46A6-A0FC-379837F07ED5",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:ysoft:safeq:6.0:build50:*:*:*:*:*:*",
"matchCriteriaId": "91FC2B3E-1E3D-48DB-958B-B50D0085EA7E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:ysoft:safeq:6.0:build51:*:*:*:*:*:*",
"matchCriteriaId": "77687CCE-6778-4E58-AEE0-5586AF22213E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:ysoft:safeq:6.0:build52:*:*:*:*:*:*",
"matchCriteriaId": "48A384EA-4806-462E-AC2F-838608918D0C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:ysoft:safeq:6.0:build53:*:*:*:*:*:*",
"matchCriteriaId": "ECE640BB-1291-40D3-A5BF-C60DF8074BC8",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:ysoft:safeq:6.0:build54:*:*:*:*:*:*",
"matchCriteriaId": "92739D9A-0931-4F66-A0F5-848854EC0F19",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:ysoft:safeq:6.0:build55:*:*:*:*:*:*",
"matchCriteriaId": "FD7E49DC-DB41-4507-8423-B3A998366FFB",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:ysoft:safeq:6.0:build56:*:*:*:*:*:*",
"matchCriteriaId": "4E909C1A-3EDC-4F14-BBC9-36429EF2F47D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:ysoft:safeq:6.0:build57:*:*:*:*:*:*",
"matchCriteriaId": "FDE4C452-5059-4118-BCF4-9E6F9D101051",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:ysoft:safeq:6.0:build58:*:*:*:*:*:*",
"matchCriteriaId": "103972CB-9627-4864-9ECC-353DFAE183A9",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:ysoft:safeq:6.0:build59:*:*:*:*:*:*",
"matchCriteriaId": "270DACEF-4164-48EE-A09B-F3AFC3F96922",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:ysoft:safeq:6.0:build60:*:*:*:*:*:*",
"matchCriteriaId": "551D9158-2BA3-41A5-BCC8-1C106C45A6A3",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:ysoft:safeq:6.0:build61:*:*:*:*:*:*",
"matchCriteriaId": "2041E54F-EE13-430C-A356-32DD8C7888D3",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:ysoft:safeq:6.0:build62:*:*:*:*:*:*",
"matchCriteriaId": "2116917F-48DB-406B-AC6D-38E15F8F184A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:ysoft:safeq:6.0:build63:*:*:*:*:*:*",
"matchCriteriaId": "77009C4D-5A00-48B7-B365-11BA35CE50C7",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:ysoft:safeq:6.0:build64:*:*:*:*:*:*",
"matchCriteriaId": "7DF1389D-B27E-440F-B8BB-1CB86E7700A6",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:ysoft:safeq:6.0:build65:*:*:*:*:*:*",
"matchCriteriaId": "52685F05-BEEE-4E71-92AA-2EDD55BDC86E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:ysoft:safeq:6.0:build66:*:*:*:*:*:*",
"matchCriteriaId": "05305162-0D3E-459E-8607-4CFBCCEF3541",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:ysoft:safeq:6.0:build67:*:*:*:*:*:*",
"matchCriteriaId": "6E35D2CD-89CB-4CCD-A447-A7C228CE6694",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:ysoft:safeq:6.0:build68:*:*:*:*:*:*",
"matchCriteriaId": "1D05FB02-3316-48EC-9D23-FA79684E95F6",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:ysoft:safeq:6.0:build69:*:*:*:*:*:*",
"matchCriteriaId": "2C12ED82-6E48-46FE-B25E-331BED09AE35",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:ysoft:safeq:6.0:build70:*:*:*:*:*:*",
"matchCriteriaId": "B039050F-AC4E-4F48-B2DA-FF5DD70D9503",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:ysoft:safeq:6.0:build71:*:*:*:*:*:*",
"matchCriteriaId": "402ADD85-9FEC-4EF4-9169-2FD84F3C5CBE",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "An issue was discovered in YSoft SAFEQ 6 before 6.0.72. Incorrect privileges were configured as part of the installer package for the Client V3 services, allowing for local user privilege escalation by overwriting the executable file via an alternative data stream. NOTE: this is not the same as CVE-2021-31859."
},
{
"lang": "es",
"value": "Se ha detectado un problema en YSoft SAFEQ 6 versiones anteriores a 6.0.72. Fueron configurados privilegios incorrectos como parte del paquete de instalaci\u00f3n de los servicios del Cliente V3, permitiendo una escalada de privilegios del usuario local al sobrescribir el archivo ejecutable por medio de un flujo de datos alternativo. NOTA: esto no es lo mismo que CVE-2021-31859.\n"
}
],
"id": "CVE-2022-38176",
"lastModified": "2024-11-21T07:15:56.433",
"metrics": {
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"exploitabilityScore": 1.8,
"impactScore": 5.9,
"source": "nvd@nist.gov",
"type": "Primary"
}
]
},
"published": "2022-09-06T21:15:08.967",
"references": [
{
"source": "cve@mitre.org",
"tags": [
"Vendor Advisory"
],
"url": "https://www.ysoft.com/en/legal/ysoft-safeq-client-v3-local-privilege-escalation"
},
{
"source": "cve@mitre.org",
"tags": [
"Vendor Advisory"
],
"url": "https://ysoft.com"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
],
"url": "https://www.ysoft.com/en/legal/ysoft-safeq-client-v3-local-privilege-escalation"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
],
"url": "https://ysoft.com"
}
],
"sourceIdentifier": "cve@mitre.org",
"vulnStatus": "Modified",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "NVD-CWE-noinfo"
}
],
"source": "nvd@nist.gov",
"type": "Primary"
}
]
}
FKIE_CVE-2021-31859
Vulnerability from fkie_nvd - Published: 2021-07-14 17:15 - Updated: 2024-11-21 06:06
Severity ?
Summary
Incorrect privileges in the MU55 FlexiSpooler service in YSoft SafeQ 6 6.0.55 allows local user privilege escalation by overwriting the executable file via an alternative data stream.
References
| URL | Tags | ||
|---|---|---|---|
| cve@mitre.org | https://www.ysoft.com/en | Vendor Advisory | |
| cve@mitre.org | https://www.ysoft.com/en/legal/ysoft-safeq-flexispooler | Vendor Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | https://www.ysoft.com/en | Vendor Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | https://www.ysoft.com/en/legal/ysoft-safeq-flexispooler | Vendor Advisory |
{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:ysoft:safeq:6.0.55:*:*:*:*:*:*:*",
"matchCriteriaId": "82199E54-0F4B-48BA-B2AA-BE9FD9D88668",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Incorrect privileges in the MU55 FlexiSpooler service in YSoft SafeQ 6 6.0.55 allows local user privilege escalation by overwriting the executable file via an alternative data stream."
},
{
"lang": "es",
"value": "Unos privilegios incorrectos en el servicio MU55 FlexiSpooler en YSoft SafeQ versi\u00f3n 6 6.0.55, permite una escalada de privilegios de usuario local al sobreescribir el archivo ejecutable por medio de un flujo de datos alternativo"
}
],
"id": "CVE-2021-31859",
"lastModified": "2024-11-21T06:06:22.420",
"metrics": {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "HIGH",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "LOCAL",
"authentication": "NONE",
"availabilityImpact": "COMPLETE",
"baseScore": 7.2,
"confidentialityImpact": "COMPLETE",
"integrityImpact": "COMPLETE",
"vectorString": "AV:L/AC:L/Au:N/C:C/I:C/A:C",
"version": "2.0"
},
"exploitabilityScore": 3.9,
"impactScore": 10.0,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "nvd@nist.gov",
"type": "Primary",
"userInteractionRequired": false
}
],
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"exploitabilityScore": 1.8,
"impactScore": 5.9,
"source": "nvd@nist.gov",
"type": "Primary"
}
]
},
"published": "2021-07-14T17:15:08.127",
"references": [
{
"source": "cve@mitre.org",
"tags": [
"Vendor Advisory"
],
"url": "https://www.ysoft.com/en"
},
{
"source": "cve@mitre.org",
"tags": [
"Vendor Advisory"
],
"url": "https://www.ysoft.com/en/legal/ysoft-safeq-flexispooler"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
],
"url": "https://www.ysoft.com/en"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
],
"url": "https://www.ysoft.com/en/legal/ysoft-safeq-flexispooler"
}
],
"sourceIdentifier": "cve@mitre.org",
"vulnStatus": "Modified",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "CWE-732"
}
],
"source": "nvd@nist.gov",
"type": "Primary"
}
]
}
CVE-2022-23862 (GCVE-0-2022-23862)
Vulnerability from cvelistv5 – Published: 2024-10-22 00:00 – Updated: 2024-10-22 18:30
VLAI?
Summary
A Local Privilege Escalation issue was discovered in Y Soft SAFEQ 6 Build 53. The SafeQ JMX service running on port 9696 is vulnerable to JMX MLet attacks. Because the service did not enforce authentication and was running under the "NT Authority\System" user, an attacker is able to use the vulnerability to execute arbitrary code and elevate to the system user.
Severity ?
8.4 (High)
CWE
- n/a
Assigner
References
{
"containers": {
"adp": [
{
"affected": [
{
"cpes": [
"cpe:2.3:a:ysoft:safeq:*:*:*:*:*:*:*:*"
],
"defaultStatus": "unknown",
"product": "safeq",
"vendor": "ysoft",
"versions": [
{
"status": "affected",
"version": "6_build_53"
}
]
}
],
"metrics": [
{
"cvssV3_1": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 8.4,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
}
},
{
"other": {
"content": {
"id": "CVE-2022-23862",
"options": [
{
"Exploitation": "poc"
},
{
"Automatable": "no"
},
{
"Technical Impact": "total"
}
],
"role": "CISA Coordinator",
"timestamp": "2024-10-22T18:12:11.950986Z",
"version": "2.0.3"
},
"type": "ssvc"
}
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-306",
"description": "CWE-306 Missing Authentication for Critical Function",
"lang": "en",
"type": "CWE"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2024-10-22T18:30:53.788Z",
"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"shortName": "CISA-ADP"
},
"title": "CISA ADP Vulnrichment"
}
],
"cna": {
"affected": [
{
"product": "n/a",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "n/a"
}
]
}
],
"descriptions": [
{
"lang": "en",
"value": "A Local Privilege Escalation issue was discovered in Y Soft SAFEQ 6 Build 53. The SafeQ JMX service running on port 9696 is vulnerable to JMX MLet attacks. Because the service did not enforce authentication and was running under the \"NT Authority\\System\" user, an attacker is able to use the vulnerability to execute arbitrary code and elevate to the system user."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "n/a",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2024-10-22T15:38:12.656235",
"orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"shortName": "mitre"
},
"references": [
{
"url": "https://ysoft.com"
},
{
"url": "https://github.com/mbadanoiu/CVE-2022-23862"
},
{
"url": "https://github.com/mbadanoiu/CVE-2022-23862/blob/main/SafeQ%20-%20CVE-2022-23862.pdf"
}
]
}
},
"cveMetadata": {
"assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"assignerShortName": "mitre",
"cveId": "CVE-2022-23862",
"datePublished": "2024-10-22T00:00:00",
"dateReserved": "2022-01-24T00:00:00",
"dateUpdated": "2024-10-22T18:30:53.788Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2022-23861 (GCVE-0-2022-23861)
Vulnerability from cvelistv5 – Published: 2024-10-22 00:00 – Updated: 2024-10-22 18:30
VLAI?
Summary
Multiple Stored Cross-Site Scripting vulnerabilities were discovered in Y Soft SAFEQ 6 Build 53. Multiple fields in the YSoft SafeQ web application can be used to inject malicious inputs that, due to a lack of output sanitization, result in the execution of arbitrary JS code. These fields can be leveraged to perform XSS attacks on legitimate users accessing the SafeQ web interface.
Severity ?
6.1 (Medium)
CWE
- n/a
Assigner
References
{
"containers": {
"adp": [
{
"affected": [
{
"cpes": [
"cpe:2.3:a:ysoft:safeq:*:*:*:*:*:*:*:*"
],
"defaultStatus": "unknown",
"product": "safeq",
"vendor": "ysoft",
"versions": [
{
"status": "affected",
"version": "6_build_53"
}
]
}
],
"metrics": [
{
"cvssV3_1": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 6.1,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"privilegesRequired": "NONE",
"scope": "CHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
"version": "3.1"
}
},
{
"other": {
"content": {
"id": "CVE-2022-23861",
"options": [
{
"Exploitation": "poc"
},
{
"Automatable": "no"
},
{
"Technical Impact": "partial"
}
],
"role": "CISA Coordinator",
"timestamp": "2024-10-22T18:28:10.071360Z",
"version": "2.0.3"
},
"type": "ssvc"
}
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-79",
"description": "CWE-79 Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)",
"lang": "en",
"type": "CWE"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2024-10-22T18:30:05.273Z",
"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"shortName": "CISA-ADP"
},
"title": "CISA ADP Vulnrichment"
}
],
"cna": {
"affected": [
{
"product": "n/a",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "n/a"
}
]
}
],
"descriptions": [
{
"lang": "en",
"value": "Multiple Stored Cross-Site Scripting vulnerabilities were discovered in Y Soft SAFEQ 6 Build 53. Multiple fields in the YSoft SafeQ web application can be used to inject malicious inputs that, due to a lack of output sanitization, result in the execution of arbitrary JS code. These fields can be leveraged to perform XSS attacks on legitimate users accessing the SafeQ web interface."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "n/a",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2024-10-22T15:44:27.608800",
"orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"shortName": "mitre"
},
"references": [
{
"url": "https://ysoft.com"
},
{
"url": "https://github.com/mbadanoiu/CVE-2022-23861"
},
{
"url": "https://github.com/mbadanoiu/CVE-2022-23861/blob/main/SafeQ%20-%20CVE-2022-23861.pdf"
}
]
}
},
"cveMetadata": {
"assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"assignerShortName": "mitre",
"cveId": "CVE-2022-23861",
"datePublished": "2024-10-22T00:00:00",
"dateReserved": "2022-01-24T00:00:00",
"dateUpdated": "2024-10-22T18:30:05.273Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2022-38176 (GCVE-0-2022-38176)
Vulnerability from cvelistv5 – Published: 2022-09-06 20:32 – Updated: 2024-08-03 10:45
VLAI?
Summary
An issue was discovered in YSoft SAFEQ 6 before 6.0.72. Incorrect privileges were configured as part of the installer package for the Client V3 services, allowing for local user privilege escalation by overwriting the executable file via an alternative data stream. NOTE: this is not the same as CVE-2021-31859.
Severity ?
No CVSS data available.
CWE
- n/a
Assigner
References
| URL | Tags | |||||||
|---|---|---|---|---|---|---|---|---|
|
||||||||
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-03T10:45:52.959Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"tags": [
"x_refsource_MISC",
"x_transferred"
],
"url": "https://ysoft.com"
},
{
"tags": [
"x_refsource_MISC",
"x_transferred"
],
"url": "https://www.ysoft.com/en/legal/ysoft-safeq-client-v3-local-privilege-escalation"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "n/a",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "n/a"
}
]
}
],
"descriptions": [
{
"lang": "en",
"value": "An issue was discovered in YSoft SAFEQ 6 before 6.0.72. Incorrect privileges were configured as part of the installer package for the Client V3 services, allowing for local user privilege escalation by overwriting the executable file via an alternative data stream. NOTE: this is not the same as CVE-2021-31859."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "n/a",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2022-09-06T20:32:12",
"orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"shortName": "mitre"
},
"references": [
{
"tags": [
"x_refsource_MISC"
],
"url": "https://ysoft.com"
},
{
"tags": [
"x_refsource_MISC"
],
"url": "https://www.ysoft.com/en/legal/ysoft-safeq-client-v3-local-privilege-escalation"
}
],
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "cve@mitre.org",
"ID": "CVE-2022-38176",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "An issue was discovered in YSoft SAFEQ 6 before 6.0.72. Incorrect privileges were configured as part of the installer package for the Client V3 services, allowing for local user privilege escalation by overwriting the executable file via an alternative data stream. NOTE: this is not the same as CVE-2021-31859."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "https://ysoft.com",
"refsource": "MISC",
"url": "https://ysoft.com"
},
{
"name": "https://www.ysoft.com/en/legal/ysoft-safeq-client-v3-local-privilege-escalation",
"refsource": "MISC",
"url": "https://www.ysoft.com/en/legal/ysoft-safeq-client-v3-local-privilege-escalation"
}
]
}
}
}
},
"cveMetadata": {
"assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"assignerShortName": "mitre",
"cveId": "CVE-2022-38176",
"datePublished": "2022-09-06T20:32:12",
"dateReserved": "2022-08-12T00:00:00",
"dateUpdated": "2024-08-03T10:45:52.959Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2021-31859 (GCVE-0-2021-31859)
Vulnerability from cvelistv5 – Published: 2021-07-14 16:38 – Updated: 2024-08-03 23:10
VLAI?
Summary
Incorrect privileges in the MU55 FlexiSpooler service in YSoft SafeQ 6 6.0.55 allows local user privilege escalation by overwriting the executable file via an alternative data stream.
Severity ?
No CVSS data available.
CWE
- n/a
Assigner
References
| URL | Tags | |||||||
|---|---|---|---|---|---|---|---|---|
|
||||||||
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-03T23:10:30.830Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"tags": [
"x_refsource_MISC",
"x_transferred"
],
"url": "https://www.ysoft.com/en"
},
{
"tags": [
"x_refsource_MISC",
"x_transferred"
],
"url": "https://www.ysoft.com/en/legal/ysoft-safeq-flexispooler"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "n/a",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "n/a"
}
]
}
],
"descriptions": [
{
"lang": "en",
"value": "Incorrect privileges in the MU55 FlexiSpooler service in YSoft SafeQ 6 6.0.55 allows local user privilege escalation by overwriting the executable file via an alternative data stream."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "n/a",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2021-07-14T16:38:13",
"orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"shortName": "mitre"
},
"references": [
{
"tags": [
"x_refsource_MISC"
],
"url": "https://www.ysoft.com/en"
},
{
"tags": [
"x_refsource_MISC"
],
"url": "https://www.ysoft.com/en/legal/ysoft-safeq-flexispooler"
}
],
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "cve@mitre.org",
"ID": "CVE-2021-31859",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "Incorrect privileges in the MU55 FlexiSpooler service in YSoft SafeQ 6 6.0.55 allows local user privilege escalation by overwriting the executable file via an alternative data stream."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "https://www.ysoft.com/en",
"refsource": "MISC",
"url": "https://www.ysoft.com/en"
},
{
"name": "https://www.ysoft.com/en/legal/ysoft-safeq-flexispooler",
"refsource": "MISC",
"url": "https://www.ysoft.com/en/legal/ysoft-safeq-flexispooler"
}
]
}
}
}
},
"cveMetadata": {
"assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"assignerShortName": "mitre",
"cveId": "CVE-2021-31859",
"datePublished": "2021-07-14T16:38:13",
"dateReserved": "2021-04-28T00:00:00",
"dateUpdated": "2024-08-03T23:10:30.830Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2022-23862 (GCVE-0-2022-23862)
Vulnerability from nvd – Published: 2024-10-22 00:00 – Updated: 2024-10-22 18:30
VLAI?
Summary
A Local Privilege Escalation issue was discovered in Y Soft SAFEQ 6 Build 53. The SafeQ JMX service running on port 9696 is vulnerable to JMX MLet attacks. Because the service did not enforce authentication and was running under the "NT Authority\System" user, an attacker is able to use the vulnerability to execute arbitrary code and elevate to the system user.
Severity ?
8.4 (High)
CWE
- n/a
Assigner
References
{
"containers": {
"adp": [
{
"affected": [
{
"cpes": [
"cpe:2.3:a:ysoft:safeq:*:*:*:*:*:*:*:*"
],
"defaultStatus": "unknown",
"product": "safeq",
"vendor": "ysoft",
"versions": [
{
"status": "affected",
"version": "6_build_53"
}
]
}
],
"metrics": [
{
"cvssV3_1": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 8.4,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
}
},
{
"other": {
"content": {
"id": "CVE-2022-23862",
"options": [
{
"Exploitation": "poc"
},
{
"Automatable": "no"
},
{
"Technical Impact": "total"
}
],
"role": "CISA Coordinator",
"timestamp": "2024-10-22T18:12:11.950986Z",
"version": "2.0.3"
},
"type": "ssvc"
}
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-306",
"description": "CWE-306 Missing Authentication for Critical Function",
"lang": "en",
"type": "CWE"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2024-10-22T18:30:53.788Z",
"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"shortName": "CISA-ADP"
},
"title": "CISA ADP Vulnrichment"
}
],
"cna": {
"affected": [
{
"product": "n/a",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "n/a"
}
]
}
],
"descriptions": [
{
"lang": "en",
"value": "A Local Privilege Escalation issue was discovered in Y Soft SAFEQ 6 Build 53. The SafeQ JMX service running on port 9696 is vulnerable to JMX MLet attacks. Because the service did not enforce authentication and was running under the \"NT Authority\\System\" user, an attacker is able to use the vulnerability to execute arbitrary code and elevate to the system user."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "n/a",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2024-10-22T15:38:12.656235",
"orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"shortName": "mitre"
},
"references": [
{
"url": "https://ysoft.com"
},
{
"url": "https://github.com/mbadanoiu/CVE-2022-23862"
},
{
"url": "https://github.com/mbadanoiu/CVE-2022-23862/blob/main/SafeQ%20-%20CVE-2022-23862.pdf"
}
]
}
},
"cveMetadata": {
"assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"assignerShortName": "mitre",
"cveId": "CVE-2022-23862",
"datePublished": "2024-10-22T00:00:00",
"dateReserved": "2022-01-24T00:00:00",
"dateUpdated": "2024-10-22T18:30:53.788Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2022-23861 (GCVE-0-2022-23861)
Vulnerability from nvd – Published: 2024-10-22 00:00 – Updated: 2024-10-22 18:30
VLAI?
Summary
Multiple Stored Cross-Site Scripting vulnerabilities were discovered in Y Soft SAFEQ 6 Build 53. Multiple fields in the YSoft SafeQ web application can be used to inject malicious inputs that, due to a lack of output sanitization, result in the execution of arbitrary JS code. These fields can be leveraged to perform XSS attacks on legitimate users accessing the SafeQ web interface.
Severity ?
6.1 (Medium)
CWE
- n/a
Assigner
References
{
"containers": {
"adp": [
{
"affected": [
{
"cpes": [
"cpe:2.3:a:ysoft:safeq:*:*:*:*:*:*:*:*"
],
"defaultStatus": "unknown",
"product": "safeq",
"vendor": "ysoft",
"versions": [
{
"status": "affected",
"version": "6_build_53"
}
]
}
],
"metrics": [
{
"cvssV3_1": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 6.1,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"privilegesRequired": "NONE",
"scope": "CHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
"version": "3.1"
}
},
{
"other": {
"content": {
"id": "CVE-2022-23861",
"options": [
{
"Exploitation": "poc"
},
{
"Automatable": "no"
},
{
"Technical Impact": "partial"
}
],
"role": "CISA Coordinator",
"timestamp": "2024-10-22T18:28:10.071360Z",
"version": "2.0.3"
},
"type": "ssvc"
}
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-79",
"description": "CWE-79 Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)",
"lang": "en",
"type": "CWE"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2024-10-22T18:30:05.273Z",
"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"shortName": "CISA-ADP"
},
"title": "CISA ADP Vulnrichment"
}
],
"cna": {
"affected": [
{
"product": "n/a",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "n/a"
}
]
}
],
"descriptions": [
{
"lang": "en",
"value": "Multiple Stored Cross-Site Scripting vulnerabilities were discovered in Y Soft SAFEQ 6 Build 53. Multiple fields in the YSoft SafeQ web application can be used to inject malicious inputs that, due to a lack of output sanitization, result in the execution of arbitrary JS code. These fields can be leveraged to perform XSS attacks on legitimate users accessing the SafeQ web interface."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "n/a",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2024-10-22T15:44:27.608800",
"orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"shortName": "mitre"
},
"references": [
{
"url": "https://ysoft.com"
},
{
"url": "https://github.com/mbadanoiu/CVE-2022-23861"
},
{
"url": "https://github.com/mbadanoiu/CVE-2022-23861/blob/main/SafeQ%20-%20CVE-2022-23861.pdf"
}
]
}
},
"cveMetadata": {
"assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"assignerShortName": "mitre",
"cveId": "CVE-2022-23861",
"datePublished": "2024-10-22T00:00:00",
"dateReserved": "2022-01-24T00:00:00",
"dateUpdated": "2024-10-22T18:30:05.273Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2022-38176 (GCVE-0-2022-38176)
Vulnerability from nvd – Published: 2022-09-06 20:32 – Updated: 2024-08-03 10:45
VLAI?
Summary
An issue was discovered in YSoft SAFEQ 6 before 6.0.72. Incorrect privileges were configured as part of the installer package for the Client V3 services, allowing for local user privilege escalation by overwriting the executable file via an alternative data stream. NOTE: this is not the same as CVE-2021-31859.
Severity ?
No CVSS data available.
CWE
- n/a
Assigner
References
| URL | Tags | |||||||
|---|---|---|---|---|---|---|---|---|
|
||||||||
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-03T10:45:52.959Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"tags": [
"x_refsource_MISC",
"x_transferred"
],
"url": "https://ysoft.com"
},
{
"tags": [
"x_refsource_MISC",
"x_transferred"
],
"url": "https://www.ysoft.com/en/legal/ysoft-safeq-client-v3-local-privilege-escalation"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "n/a",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "n/a"
}
]
}
],
"descriptions": [
{
"lang": "en",
"value": "An issue was discovered in YSoft SAFEQ 6 before 6.0.72. Incorrect privileges were configured as part of the installer package for the Client V3 services, allowing for local user privilege escalation by overwriting the executable file via an alternative data stream. NOTE: this is not the same as CVE-2021-31859."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "n/a",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2022-09-06T20:32:12",
"orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"shortName": "mitre"
},
"references": [
{
"tags": [
"x_refsource_MISC"
],
"url": "https://ysoft.com"
},
{
"tags": [
"x_refsource_MISC"
],
"url": "https://www.ysoft.com/en/legal/ysoft-safeq-client-v3-local-privilege-escalation"
}
],
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "cve@mitre.org",
"ID": "CVE-2022-38176",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "An issue was discovered in YSoft SAFEQ 6 before 6.0.72. Incorrect privileges were configured as part of the installer package for the Client V3 services, allowing for local user privilege escalation by overwriting the executable file via an alternative data stream. NOTE: this is not the same as CVE-2021-31859."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "https://ysoft.com",
"refsource": "MISC",
"url": "https://ysoft.com"
},
{
"name": "https://www.ysoft.com/en/legal/ysoft-safeq-client-v3-local-privilege-escalation",
"refsource": "MISC",
"url": "https://www.ysoft.com/en/legal/ysoft-safeq-client-v3-local-privilege-escalation"
}
]
}
}
}
},
"cveMetadata": {
"assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"assignerShortName": "mitre",
"cveId": "CVE-2022-38176",
"datePublished": "2022-09-06T20:32:12",
"dateReserved": "2022-08-12T00:00:00",
"dateUpdated": "2024-08-03T10:45:52.959Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2021-31859 (GCVE-0-2021-31859)
Vulnerability from nvd – Published: 2021-07-14 16:38 – Updated: 2024-08-03 23:10
VLAI?
Summary
Incorrect privileges in the MU55 FlexiSpooler service in YSoft SafeQ 6 6.0.55 allows local user privilege escalation by overwriting the executable file via an alternative data stream.
Severity ?
No CVSS data available.
CWE
- n/a
Assigner
References
| URL | Tags | |||||||
|---|---|---|---|---|---|---|---|---|
|
||||||||
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-03T23:10:30.830Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"tags": [
"x_refsource_MISC",
"x_transferred"
],
"url": "https://www.ysoft.com/en"
},
{
"tags": [
"x_refsource_MISC",
"x_transferred"
],
"url": "https://www.ysoft.com/en/legal/ysoft-safeq-flexispooler"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "n/a",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "n/a"
}
]
}
],
"descriptions": [
{
"lang": "en",
"value": "Incorrect privileges in the MU55 FlexiSpooler service in YSoft SafeQ 6 6.0.55 allows local user privilege escalation by overwriting the executable file via an alternative data stream."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "n/a",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2021-07-14T16:38:13",
"orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"shortName": "mitre"
},
"references": [
{
"tags": [
"x_refsource_MISC"
],
"url": "https://www.ysoft.com/en"
},
{
"tags": [
"x_refsource_MISC"
],
"url": "https://www.ysoft.com/en/legal/ysoft-safeq-flexispooler"
}
],
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "cve@mitre.org",
"ID": "CVE-2021-31859",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "Incorrect privileges in the MU55 FlexiSpooler service in YSoft SafeQ 6 6.0.55 allows local user privilege escalation by overwriting the executable file via an alternative data stream."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "https://www.ysoft.com/en",
"refsource": "MISC",
"url": "https://www.ysoft.com/en"
},
{
"name": "https://www.ysoft.com/en/legal/ysoft-safeq-flexispooler",
"refsource": "MISC",
"url": "https://www.ysoft.com/en/legal/ysoft-safeq-flexispooler"
}
]
}
}
}
},
"cveMetadata": {
"assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"assignerShortName": "mitre",
"cveId": "CVE-2021-31859",
"datePublished": "2021-07-14T16:38:13",
"dateReserved": "2021-04-28T00:00:00",
"dateUpdated": "2024-08-03T23:10:30.830Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}