Sysaid – Pro Plus Edition, SysAid Help Desk Broken Access Control v20.4.74 b10, v22.1.20 b62, v22.1.30 b49 - An attacker needs to log in as a guest after that the system redirects him to the service portal or EndUserPortal.JSP, then he needs to change the path in the URL to /ConcurrentLogin%2ejsp after that he will receive an error message with a login button, by clicking on it, he will connect to the system dashboard. The attacker can receive sensitive data like server details, usernames, workstations, etc. He can also perform actions such as uploading files, deleting calls from the system.
Metrics
Affected Vendors & Products
References
Link | Providers |
---|---|
https://www.gov.il/en/departments/faq/cve_advisories |
History
No history.
MITRE
Status: PUBLISHED
Assigner: INCD
Published: 2022-05-12T19:48:42.372877Z
Updated: 2024-09-17T02:47:50.302Z
Reserved: 2022-01-07T00:00:00
Link: CVE-2022-22798
Vulnrichment
No data.
NVD
Status : Modified
Published: 2022-05-12T20:15:14.977
Modified: 2024-11-21T06:47:28.560
Link: CVE-2022-22798
Redhat
No data.