Vulnerability Details : CVE-2022-23320
XMPie uStore 12.3.7244.0 allows for administrators to generate reports based on raw SQL queries. Since the application ships with default administrative credentials, an attacker may authenticate into the application and exfiltrate sensitive information from the database.
Vulnerability category: Information leak
Products affected by CVE-2022-23320
- cpe:2.3:a:xerox:xmpie_ustore:12.3.7244.0:*:*:*:*:*:*:*
Exploit prediction scoring system (EPSS) score for CVE-2022-23320
0.23%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 61 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2022-23320
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
5.0
|
MEDIUM | AV:N/AC:L/Au:N/C:P/I:N/A:N |
10.0
|
2.9
|
NIST | |
7.5
|
HIGH | CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N |
3.9
|
3.6
|
NIST |
CWE ids for CVE-2022-23320
-
The product exposes sensitive information to an actor that is not explicitly authorized to have access to that information.Assigned by: nvd@nist.gov (Primary)
References for CVE-2022-23320
-
https://www.triaxiomsecurity.com/xmpie-ustore-vulnerabilities-discovered/
XMPie uStore Vulnerabilities Discovered » Triaxiom SecurityExploit;Third Party Advisory
-
http://xmpie.com
Multichannel and VDP Marketing Software | XMPieVendor Advisory
-
https://www.linkedin.com/feed/update/urn:li:activity:6894666176450887681?commentUrn=urn%3Ali%3Acomment%3A%28activity%3A6894666176450887681%2C6895051709354192896%29
Matthew Schmidt on LinkedIn: XMPie uStore Vulnerabilities Discovered » Triaxiom SecurityThird Party Advisory
-
https://www.xmpie.com/ustore-release-notes/
uStore Release Notes - XMPieRelease Notes;Vendor Advisory
Jump to