Show filters
38 Total Results
Displaying 11-20 of 38
Sort by:
Attacker Value
Unknown
CVE-2022-40323
Disclosure Date: September 11, 2022 (last updated October 08, 2023)
SysAid Help Desk before 22.1.65 allows XSS in the Password Services module, aka FR# 67241.
0
Attacker Value
Unknown
CVE-2022-40322
Disclosure Date: September 11, 2022 (last updated October 08, 2023)
SysAid Help Desk before 22.1.65 allows XSS, aka FR# 66542 and 65579.
0
Attacker Value
Unknown
CVE-2022-23170
Disclosure Date: June 14, 2022 (last updated February 24, 2025)
SysAid - Okta SSO integration - was found vulnerable to XML External Entity Injection vulnerability. Any SysAid environment that uses the Okta SSO integration might be vulnerable. An unauthenticated attacker could exploit the XXE vulnerability by sending a malformed POST request to the identity provider endpoint. An attacker can extract the identity provider endpoint by decoding the SAMLRequest parameter's value and searching for the AssertionConsumerServiceURL parameter's value. It often allows an attacker to view files on the application server filesystem and interact with any back-end or external systems that the application can access. In some situations, an attacker can escalate an XXE attack to compromise the underlying server or other back-end infrastructure by leveraging the XXE vulnerability to perform server-side request forgery (SSRF) attacks.
0
Attacker Value
Unknown
CVE-2022-22796
Disclosure Date: May 09, 2022 (last updated February 23, 2025)
Sysaid – Sysaid System Takeover - An attacker can bypass the authentication process by accessing to: /wmiwizard.jsp, Then to: /ConcurrentLogin.jsp, then click on the login button, and it will redirect you to /home.jsp without any authentication.
0
Attacker Value
Unknown
CVE-2022-22798
Disclosure Date: May 09, 2022 (last updated February 23, 2025)
Sysaid – Pro Plus Edition, SysAid Help Desk Broken Access Control v20.4.74 b10, v22.1.20 b62, v22.1.30 b49 - An attacker needs to log in as a guest after that the system redirects him to the service portal or EndUserPortal.JSP, then he needs to change the path in the URL to /ConcurrentLogin%2ejsp after that he will receive an error message with a login button, by clicking on it, he will connect to the system dashboard. The attacker can receive sensitive data like server details, usernames, workstations, etc. He can also perform actions such as uploading files, deleting calls from the system.
0
Attacker Value
Unknown
CVE-2022-22797
Disclosure Date: May 09, 2022 (last updated February 23, 2025)
Sysaid – sysaid Open Redirect - An Attacker can change the redirect link at the parameter "redirectURL" from"GET" request from the url location: /CommunitySSORedirect.jsp?redirectURL=https://google.com. Unvalidated redirects and forwards are possible when a web application accepts untrusted input that could cause the web application to redirect the request to a URL contained within untrusted input. By modifying untrusted URL input to a malicious site, an attacker may successfully launch a phishing scam and steal user credentials.
0
Attacker Value
Unknown
CVE-2022-23166
Disclosure Date: May 09, 2022 (last updated February 23, 2025)
Sysaid – Sysaid Local File Inclusion (LFI) – An unauthenticated attacker can access to the system by accessing to "/lib/tinymce/examples/index.html" path. in the "Insert/Edit Embedded Media" window Choose Type : iFrame and File/URL : [here is the LFI] Solution: Update to 22.2.20 cloud version, or to 22.1.64 on premise version.
0
Attacker Value
Unknown
CVE-2022-23165
Disclosure Date: May 09, 2022 (last updated February 23, 2025)
Sysaid – Sysaid 14.2.0 Reflected Cross-Site Scripting (XSS) - The parameter "helpPageName" used by the page "/help/treecontent.jsp" suffers from a Reflected Cross-Site Scripting vulnerability. For an attacker to exploit this Cross-Site Scripting vulnerability, it's necessary for the affected product to expose the Offline Help Pages. An attacker may gain access to sensitive information or execute client-side code in the browser session of the victim user. Furthermore, an attacker would require the victim to open a malicious link. An attacker may exploit this vulnerability in order to perform phishing attacks. The attacker can receive sensitive data like server details, usernames, workstations, etc. He can also perform actions such as uploading files, deleting calls from the system
0
Attacker Value
Unknown
CVE-2021-43974
Disclosure Date: January 11, 2022 (last updated February 23, 2025)
An issue was discovered in SysAid ITIL 20.4.74 b10. The /enduserreg endpoint is used to register end users anonymously, but does not respect the server-side setting that determines if anonymous users are allowed to register new accounts. Configuring the server-side setting to disable anonymous user registration only hides the client-side registration form. An attacker can still post registration data to create new accounts without prior authentication.
0
Attacker Value
Unknown
CVE-2021-43973
Disclosure Date: January 11, 2022 (last updated February 23, 2025)
An unrestricted file upload vulnerability in /UploadPsIcon.jsp in SysAid ITIL 20.4.74 b10 allows a remote authenticated attacker to upload an arbitrary file via the file parameter in the HTTP POST body. A successful request returns the absolute, server-side filesystem path of the uploaded file.
0