Rewterz Threat Alert – Bitter APT Group – IOCs
March 3, 2022Rewterz Threat Advisory – Multiple Fortinet Vulnerabilities
March 4, 2022Rewterz Threat Alert – Bitter APT Group – IOCs
March 3, 2022Rewterz Threat Advisory – Multiple Fortinet Vulnerabilities
March 4, 2022Severity
High
Analysis Summary
CVE-2022-24947
Apache JSPWiki is vulnerable to cross-site request forgery, caused by improper validation of user-supplied input by the user preferences form. By persuading an authenticated user to visit a malicious Web site, a remote attacker could send a malformed HTTP request to take over users’ accounts. An attacker could exploit this vulnerability to perform cross-site scripting attacks, Web cache poisoning, and other malicious activities.
CVE-2022-24948
Apache JSPWiki is vulnerable to cross-site scripting, caused by improper validation of user-supplied input by the user preferences screen. A remote authenticated attacker could exploit this vulnerability to inject malicious script into a Web page which would be executed in a victim’s Web browser within the security context of the hosting Web site, once the page is viewed. An attacker could use this vulnerability to steal the victim’s cookie-based authentication credentials.
Impact
- Unauthorized Access
- Cross-Site Scripting
Indicators of Compromise
CVE
- CVE-2022-24947
- CVE-2022-24948
Affected Vendors
Apache
Affected Products
- Apache JSPWiki 2.10.5
- Apache JSPWiki 2.10.4
- Apache JSPWiki 2.10.3
- Apache JSPWiki 2.11.0.M2
- Apache JSPWiki 2.11.1
Remediation
Upgrade to the latest version of Apache JSPWiki, available from the Apache Web site.