Enhancement: cves/2022/CVE-2022-22954.yaml by mp

patch-1
MostInterestingBotInTheWorld 2022-05-19 11:47:02 -04:00
parent ca5eb51652
commit 15fd425b1b
1 changed files with 6 additions and 3 deletions

View File

@ -1,14 +1,15 @@
id: CVE-2022-22954 id: CVE-2022-22954
info: info:
name: VMware Workspace ONE Access - Freemarker SSTI name: VMware Workspace ONE Access - Server-Side Template Injection
author: sherlocksecurity author: sherlocksecurity
severity: critical severity: critical
description: An unauthenticated attacker with network access could exploit this vulnerability by sending a specially crafted request to a vulnerable VMware Workspace ONE or Identity Manager. Successful exploitation could result in remote code execution by exploiting a server-side template injection flaw. description: VMware Workspace ONE Access is susceptible to a remote code execution vulnerability due to a server-side template injection flaw. An unauthenticated attacker with network access could exploit this vulnerability by sending a specially crafted request to a vulnerable VMware Workspace ONE or Identity Manager.
reference: reference:
- https://www.tenable.com/blog/vmware-patches-multiple-vulnerabilities-in-workspace-one-vmsa-2022-0011 - https://www.tenable.com/blog/vmware-patches-multiple-vulnerabilities-in-workspace-one-vmsa-2022-0011
- https://www.vmware.com/security/advisories/VMSA-2022-0011.html - https://www.vmware.com/security/advisories/VMSA-2022-0011.html
- http://packetstormsecurity.com/files/166935/VMware-Workspace-ONE-Access-Template-Injection-Command-Execution.html - http://packetstormsecurity.com/files/166935/VMware-Workspace-ONE-Access-Template-Injection-Command-Execution.html
-
classification: classification:
cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
cvss-score: 9.8 cvss-score: 9.8
@ -32,3 +33,5 @@ requests:
- type: status - type: status
status: status:
- 400 - 400
# Enhanced by mp on 2022/05/19