← Zuruck zu CVEs
CVE-2022-50802
MEDIUM6.1
Beschreibung
ETAP Safety Manager 1.0.0.32 contains a cross-site scripting vulnerability in the 'action' GET parameter that allows unauthenticated attackers to inject malicious HTML and JavaScript. Attackers can craft specially formed requests to execute arbitrary scripts in victim browser sessions, potentially stealing credentials or performing unauthorized actions.
CVE Details
CVSS v3.1 Bewertung6.1
SchweregradMEDIUM
CVSS VektorCVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
AngriffsvektorNETWORK
KomplexitatLOW
Erforderliche PrivilegienNONE
BenutzerinteraktionREQUIRED
Veroffentlicht12/30/2025
Zuletzt geandert1/7/2026
Quellenvd
Honeypot-Sichtungen0
Betroffene Produkte
etaplighting:etap_safety_manager
Schwachen (CWE)
CWE-79
Referenzen
https://cxsecurity.com/issue/WLB-2022090031(disclosure@vulncheck.com)
https://exchange.xforce.ibmcloud.com/vulnerabilities/235743(disclosure@vulncheck.com)
https://packetstormsecurity.com/files/168339/(disclosure@vulncheck.com)
https://www.etaplighting.com/(disclosure@vulncheck.com)
https://www.vulncheck.com/advisories/etap-safety-manager-unauthenticated-reflected-cross-site-scripting-via-action-parameter(disclosure@vulncheck.com)
https://www.zeroscience.mk/en/vulnerabilities/ZSL-2022-5711.php(disclosure@vulncheck.com)
https://cxsecurity.com/issue/WLB-2022090031(134c704f-9b21-4f2e-91b3-4a467353bcc0)
https://www.zeroscience.mk/en/vulnerabilities/ZSL-2022-5711.php(134c704f-9b21-4f2e-91b3-4a467353bcc0)
IOC Korrelationen
Keine Korrelationen erfasst
This product uses data from the NVD API but is not endorsed or certified by the NVD.