An issue was discovered in the web application in Cherwell Service Management (CSM) 10.2.3. Injection of a malicious payload within the RelayState= parameter of the HTTP request body results in the hijacking of the form action. Form-action hijacking vulnerabilities arise when an application places user-supplied input into the action URL of an HTML form. An attacker can use this vulnerability to construct a URL that, if visited by another application user, will modify the action URL of a form to point to the attacker's server.
Advisories
Source ID Title
EUVD EUVD EUVD-2022-30722 An issue was discovered in the web application in Cherwell Service Management (CSM) 10.2.3. Injection of a malicious payload within the RelayState= parameter of the HTTP request body results in the hijacking of the form action. Form-action hijacking vulnerabilities arise when an application places user-supplied input into the action URL of an HTML form. An attacker can use this vulnerability to construct a URL that, if visited by another application user, will modify the action URL of a form to point to the attacker's server.
Fixes

Solution

No solution given by the vendor.


Workaround

No workaround given by the vendor.

History

No history.

Projects

Sign in to view the affected projects.

cve-icon MITRE

Status: PUBLISHED

Assigner: mitre

Published:

Updated: 2024-08-03T04:56:37.939Z

Reserved: 2022-02-28T00:00:00

Link: CVE-2022-26156

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Modified

Published: 2022-02-28T16:15:08.120

Modified: 2024-11-21T06:53:32.193

Link: CVE-2022-26156

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.

Weaknesses