Vulnerability Details : CVE-2022-36179
Potential exploit
Fusiondirectory 1.3 suffers from Improper Session Handling.
Products affected by CVE-2022-36179
- cpe:2.3:a:fusiondirectory:fusiondirectory:1.3:*:*:*:*:*:*:*
Exploit prediction scoring system (EPSS) score for CVE-2022-36179
0.10%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 25 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2022-36179
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
9.8
|
CRITICAL | CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H |
3.9
|
5.9
|
134c704f-9b21-4f2e-91b3-4a467353bcc0 | 2025-04-29 |
9.8
|
CRITICAL | CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H |
3.9
|
5.9
|
NIST |
CWE ids for CVE-2022-36179
-
According to WASC, "Insufficient Session Expiration is when a web site permits an attacker to reuse old session credentials or session IDs for authorization."Assigned by:
- 134c704f-9b21-4f2e-91b3-4a467353bcc0 (Secondary)
- nvd@nist.gov (Primary)
References for CVE-2022-36179
-
https://yoroi.company/research/cve-advisory-full-disclosure-multiple-vulnerabilities/
CVE Advisory - Full Disclosure Multiple Vulnerabilities - YoroiExploit;Third Party Advisory
-
http://fusiondirectory.com
FusionDirectory.com is for sale | HugeDomainsBroken Link
-
https://lists.debian.org/debian-lts-announce/2023/07/msg00009.html
[SECURITY] [DLA 3487-1] fusiondirectory security update and rebuild for php-cas
Jump to