Rewterz Threat Alert – Lazarus APT Group – Active IOCs
August 5, 2022Rewterz Threat Advisory – CVE-2022-35245 – F5 BIG-IP (APM) Vulnerability
August 5, 2022Rewterz Threat Alert – Lazarus APT Group – Active IOCs
August 5, 2022Rewterz Threat Advisory – CVE-2022-35245 – F5 BIG-IP (APM) Vulnerability
August 5, 2022Severity
Medium
Analysis Summary
CVE-2022-34158 CVSS:6.5
Apache JSPWiki is vulnerable to cross-site request forgery, caused by improper validation of user-supplied input by the Image plugin. By persuading an authenticated user to visit a malicious Web site, a remote attacker could send a malformed HTTP request to modify the email associated with the attacked account, and then a reset password request from the login page.. An attacker could exploit this vulnerability to perform cross-site scripting attacks, Web cache poisoning, and other malicious activities.
CVE-2022-28732 CVSS:6.1
Apache JSPWiki is vulnerable to cross-site scripting, caused by improper validation of user-supplied input by the WeblogPlugin. A remote attacker could exploit this vulnerability using a specially-crafted URL to execute script in a victim’s Web browser within the security context of the hosting Web site, once the URL is clicked. An attacker could use this vulnerability to steal the victim’s cookie-based authentication credentials.
CVE-2022-28731 CVSS:6.5
Apache JSPWiki is vulnerable to cross-site request forgery, caused by improper validation of user-supplied input by the UserPreferences.jsp script file. By persuading an authenticated user to visit a malicious Web site, a remote attacker could send a malformed HTTP request to modify the email associated with the attacked account, and then a reset password request from the login page.. An attacker could exploit this vulnerability to perform cross-site scripting attacks, Web cache poisoning, and other malicious activities.
CVE-2022-28730 CVSS:6.1
Apache JSPWiki is vulnerable to cross-site scripting, caused by improper validation of user-supplied input by the AJAXPreview.jsp script. A remote attacker could exploit this vulnerability using a specially-crafted URL to execute script in a victim’s Web browser within the security context of the hosting Web site, once the URL is clicked. An attacker could use this vulnerability to steal the victim’s cookie-based authentication credentials.
CVE-2022-27166 CVSS:6.1
Apache JSPWiki is vulnerable to cross-site scripting, caused by improper validation of user-supplied input by the XHRHtml2Markup.jsp script. A remote attacker could exploit this vulnerability using a specially-crafted URL to execute script in a victim’s Web browser within the security context of the hosting Web site, once the URL is clicked. An attacker could use this vulnerability to steal the victim’s cookie-based authentication credentials.
Impact
- Unauthorized Access
- Cross-site Scripting
Indicators Of Compromise
CVE
- CVE-2022-34158
- CVE-2022-28732
- CVE-2022-28731
- CVE-2022-28730
- CVE-2022-27166
Affected Vendors
Apache
Affected Products
- Apache JSPWiki 2.11.2
Remediation
Upgrade to the latest version of Apache JSPWiki, available from the Apache Website.
Apache Website