Vulnerability Description
Cross-site request forgery attacks can be carried out against the Eyes of Network web application, due to an absence of adequate protections. An attacker can, for instance, delete the admin user by directing an authenticated user to the URL https://<target-address>/module/admin_user/index.php?DataTables_Table_0_length=10&user_selected%5B%5D=1&user_mgt_list=delete_user&action=submit by means of a crafted link.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Eyeofnetwork | Eyes Of Network Web | 5.3 |
Related Weaknesses (CWE)
References
- https://www.tenable.com/security/research/tra-2022-29ExploitThird Party Advisory
- https://www.tenable.com/security/research/tra-2022-29ExploitThird Party Advisory
FAQ
What is CVE-2022-38359?
CVE-2022-38359 is a vulnerability with a CVSS score of 8.8 (HIGH). Cross-site request forgery attacks can be carried out against the Eyes of Network web application, due to an absence of adequate protections. An attacker can, for instance, delete the admin user by di...
How severe is CVE-2022-38359?
CVE-2022-38359 has been rated HIGH with a CVSS base score of 8.8/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2022-38359?
Check the references section above for vendor advisories and patch information. Affected products include: Eyeofnetwork Eyes Of Network Web.