CVE-2023-22843

An authenticated attacker with administrative access to the web management interface can inject malicious JavaScript code inside the definition of a Threat Intelligence rule, that will be stored and can later be executed by another legitimate user viewing the details of such a rule. Via stored Cross-Site Scripting (XSS), an attacker may be able to perform unauthorized actions on behalf of legitimate users and/or gather sensitive information. JavaScript injection was possible in the contents for Yara rules, while limited HTML injection has been proven for packet and STYX rules.
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:nozominetworks:cmc:*:*:*:*:*:*:*:*
cpe:2.3:a:nozominetworks:guardian:*:*:*:*:*:*:*:*

History

No history.

Information

Published : 2023-08-09 09:15

Updated : 2024-11-21 07:45


NVD link : CVE-2023-22843

Mitre link : CVE-2023-22843

CVE.ORG link : CVE-2023-22843


JSON object : View

Products Affected

nozominetworks

  • guardian
  • cmc
CWE
CWE-79

Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')