CVE-2022-2458

XML Injection (aka Blind XPath Injection) (CWE-91)

Published: Jul 18, 2022 / Updated: 28mo ago

010
CVSS 8.2EPSS 0.14%High
CVE info copied to clipboard

XML external entity injection(XXE) is a vulnerability that allows an attacker to interfere with an application's processing of XML data. This attack occurs when XML input containing a reference to an external entity is processed by a weakly configured XML parser. The software processes an XML document that can contain XML entities with URIs that resolve to documents outside of the intended sphere of control, causing the product to embed incorrect documents into its output. Here, XML external entity injection lead to External Service interaction & Internal file read in Business Central and also Kie-Server APIs.

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:N

Timeline

First Article

Feedly found the first article mentioning CVE-2022-2458. See article

Jul 18, 2022 at 8:51 AM / access.redhat.com
EPSS

EPSS Score was set to: 0.14% (Percentile: 48.2%)

Sep 18, 2023 at 3:24 PM
Static CVE Timeline Graph

Affected Systems

Redhat/process_automation_manager
+null more

Patches

bugzilla.redhat.com
+null more

Attack Patterns

CAPEC-250: XML Injection
+null more

Vendor Advisory

CVE-2022-2458
CWE-91: XML Injection (aka Blind XPath Injection) No description is available for this CVE.

References

RHSA-2022:6813: Important: Red Hat Process Automation Manager 7.13.1 security update
An update is now available for Red Hat Process Automation Manager.Red Hat Product Security has rated this update as having a security impact of Low. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section. This asynchronous security patch is an update to Red Hat Process Automation Manager 7.
CVE-2022-2458
CWE-91: XML Injection (aka Blind XPath Injection) No description is available for this CVE.

News

Multiple vulnerabilities in IBM Business Automation Manager Open Editions
Security Bulletin: Multiple security vulnerabilities are addressed with IBM Business Automation Manager Open Editions 8.0.1
In addition to updates of open source dependencies, the following security vulnerabilities are addressed with IBM Business Automation Manager Open Editions 8.0.1 CVE(s): CVE-2022-21724 , CVE-2022-1650 , CVE-2022-24785 , CVE-2021-44906 , CVE-2022-26520 , CVE-2022-0235 , CVE-2021-23436 , CVE-2022-0722 , CVE-2022-24771 , CVE-2020-28477 , CVE-2020-36518 , CVE-2022-1365 , CVE-2022-2458 , CVE-2022-24772 , CVE-2022-31129 , CVE-2022-23437 , CVE-2020-7746 , CVE-2022-23913 , CVE-2022-21363 Affected product(s) and affected version(s): Affected Product(s) Version(s) IBM Business Automation Manager Open Editions 8.0.0 Refer to the following reference URLs for remediation and additional vulnerability details: Source Bulletin: https://www.ibm.com/support/pages/node/6832944 X-Force Database: https://exchange.xforce.ibmcloud.com/vulnerabilities/218798 X-Force Database: https://exchange.xforce.ibmcloud.com/vulnerabilities/226482 X-Force Database: https://exchange.xforce.ibmcloud.com/vulnerabilities/223451 X-Force Database: https://exchange.xforce.ibmcloud.com/vulnerabilities/222195 X-Force Database: https://exchange.xforce.ibmcloud.com/vulnerabilities/217758 X-Force Database:
Red Hat Security Advisory 2022-6813-01
Red Hat Security Advisory 2022-6813-01 - Red Hat Process Automation Manager is an open source business process management suite that combines process management and decision service management and enables business and IT users to create, manage, validate, and deploy process applications and decision services. This asynchronous security patch is an update to Red Hat Process Automation Manager 7. Issues addressed include XML injection, bypass, denial of service, and traversal vulnerabilities.
RHSA-2022:6813-01: Important: Red Hat Process Automation Manager 7.13.1 security update
Synopsis: Important: Red Hat Process Automation Manager 7.13.1 security update A Red Hat Process Automation Manager 7.13.1 security update has been released.
Multiple vulnerabilities in Red Hat Process Automation Manager
A remote attacker can pass specially crafted URL to the affected application and execute arbitrary code in the system. A remote attacker can send a specially crafted request to the application and perform prototype pollution.
See 9 more articles and social media posts

CVSS V3.1

Attack Vector:Network
Attack Complexity:Low
Privileges Required:None
User Interaction:None
Scope:Unchanged
Confidentiality:High
Integrity:Low
Availability Impact:None

Categories

Be the first to know about critical vulnerabilities

Collect, analyze, and share vulnerability reports faster using AI