Vulnerability Description
An issue was discovered in the web application in Cherwell Service Management (CSM) 10.2.3. Injection of a malicious payload within the RelayState= parameter of the HTTP request body results in the hijacking of the form action. Form-action hijacking vulnerabilities arise when an application places user-supplied input into the action URL of an HTML form. An attacker can use this vulnerability to construct a URL that, if visited by another application user, will modify the action URL of a form to point to the attacker's server.
CVSS Score
MEDIUM
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Cherwell | Cherwell Service Management | 10.2.3 |
Related Weaknesses (CWE)
References
- https://github.com/l00neyhacker/CVE-2022-26156Third Party Advisory
- https://help.cherwell.com/bundle/release_notes_10_4_help_only/page/content/releaRelease NotesVendor Advisory
- https://github.com/l00neyhacker/CVE-2022-26156Third Party Advisory
- https://help.cherwell.com/bundle/release_notes_10_4_help_only/page/content/releaRelease NotesVendor Advisory
FAQ
What is CVE-2022-26156?
CVE-2022-26156 is a vulnerability with a CVSS score of 6.1 (MEDIUM). An issue was discovered in the web application in Cherwell Service Management (CSM) 10.2.3. Injection of a malicious payload within the RelayState= parameter of the HTTP request body results in the hi...
How severe is CVE-2022-26156?
CVE-2022-26156 has been rated MEDIUM with a CVSS base score of 6.1/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2022-26156?
Check the references section above for vendor advisories and patch information. Affected products include: Cherwell Cherwell Service Management.