From 4f75a44ef2c2866f3ff414870363255fc722d47b Mon Sep 17 00:00:00 2001 From: Prince Chaddha Date: Fri, 6 May 2022 21:47:16 +0530 Subject: [PATCH] Update CVE-2022-1040.yaml --- cves/2022/CVE-2022-1040.yaml | 5 ++--- 1 file changed, 2 insertions(+), 3 deletions(-) diff --git a/cves/2022/CVE-2022-1040.yaml b/cves/2022/CVE-2022-1040.yaml index ee1749ae17..9f011e4d50 100644 --- a/cves/2022/CVE-2022-1040.yaml +++ b/cves/2022/CVE-2022-1040.yaml @@ -6,8 +6,8 @@ info: severity: critical description: An authentication bypass vulnerability in the User Portal and Webadmin allows a remote attacker to execute code in Sophos Firewall version v18.5 MR3 and older. reference: - - https://nvd.nist.gov/vuln/detail/CVE-2022-1040 - https://github.com/killvxk/CVE-2022-1040 + - https://nvd.nist.gov/vuln/detail/CVE-2022-1040 classification: cvss-metrics: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N cvss-score: 9.8 @@ -18,7 +18,7 @@ info: requests: - method: POST path: - - "{{BaseURL}}/userportal/Controller?mode=8700&operation=1&datagrid=179&json={\"🦞\":\"test\"}" + - "{{BaseURL}}/userportal/Controller?mode=8700&operation=1&datagrid=179&json={\"🦞\":\"test\"}" headers: X-Requested-With: "XMLHttpRequest" @@ -37,4 +37,3 @@ requests: - type: status status: - 200 -