Vulnerability Description
Multiple XSS issues were discovered in Sage Enterprise Intelligence 2021 R1.1 that allow an attacker to execute JavaScript code in the context of users' browsers. The attacker needs to be authenticated to reach the vulnerable features. An issue is present in the Notify Users About Modification menu and the Notifications feature. A user can send malicious notifications and execute JavaScript code in the browser of every user who has enabled notifications. This is a stored XSS, and can lead to privilege escalation in the context of the application. (Another issue is present in the Favorites tab. The name of a favorite or a folder of favorites is interpreted as HTML, and can thus embed JavaScript code, which is executed when displayed. This is a self-XSS.)
CVSS Score
CRITICAL
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Sage | Sage Enterprise Intelligence | 2021_r1.1 |
Related Weaknesses (CWE)
References
- https://www.synacktiv.com/sites/default/files/2022-12/sage_sei_multiple_xss.pdfExploitTechnical DescriptionThird Party Advisory
- https://www.synacktiv.com/sites/default/files/2022-12/sage_sei_multiple_xss.pdfExploitTechnical DescriptionThird Party Advisory
FAQ
What is CVE-2022-34322?
CVE-2022-34322 is a vulnerability with a CVSS score of 9.0 (CRITICAL). Multiple XSS issues were discovered in Sage Enterprise Intelligence 2021 R1.1 that allow an attacker to execute JavaScript code in the context of users' browsers. The attacker needs to be authenticate...
How severe is CVE-2022-34322?
CVE-2022-34322 has been rated CRITICAL with a CVSS base score of 9.0/10. This is considered a critical vulnerability requiring immediate attention.
Is there a patch for CVE-2022-34322?
Check the references section above for vendor advisories and patch information. Affected products include: Sage Sage Enterprise Intelligence.