Vulnerability Description
resi-calltrace in RESI Gemini-Net 4.2 is affected by Multiple XSS issues. Unauthenticated remote attackers can inject arbitrary web script or HTML into an HTTP GET parameter that reflects user input without sanitization. This exists on numerous application endpoints,
CVSS Score
MEDIUM
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Resi | Gemini-Net | 4.2 |
Related Weaknesses (CWE)
References
- https://www.gruppotim.it/it/footer/red-team.htmlThird Party Advisory
- https://www.resi.it/prodotti-soluzioni-commerciali/gemini-network-service-monitoProduct
- https://www.gruppotim.it/it/footer/red-team.htmlThird Party Advisory
- https://www.resi.it/prodotti-soluzioni-commerciali/gemini-network-service-monitoProduct
FAQ
What is CVE-2022-29540?
CVE-2022-29540 is a vulnerability with a CVSS score of 6.1 (MEDIUM). resi-calltrace in RESI Gemini-Net 4.2 is affected by Multiple XSS issues. Unauthenticated remote attackers can inject arbitrary web script or HTML into an HTTP GET parameter that reflects user input w...
How severe is CVE-2022-29540?
CVE-2022-29540 has been rated MEDIUM with a CVSS base score of 6.1/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2022-29540?
Check the references section above for vendor advisories and patch information. Affected products include: Resi Gemini-Net.