Show plain JSON{"containers": {"cna": {"affected": [{"defaultStatus": "unaffected", "product": "Reports plugin for GLPI", "vendor": "GLPI", "versions": [{"lessThan": " Upgrade to the latest version.", "status": "affected", "version": "All versions", "versionType": "git"}]}], "credits": [{"lang": "en", "type": "finder", "user": "00000000-0000-4000-9000-000000000000", "value": "Moriel Harush, Dudu Moyal - EY \u2013 Hacktics."}], "descriptions": [{"lang": "en", "supportingMedia": [{"base64": false, "type": "text/html", "value": "\n\n<span style=\"background-color: rgb(255, 255, 255);\">GLPI - Reports plugin for GLPI Reflected Cross-Site-Scripting (RXSS).</span><br><strong>Type 1: </strong><span style=\"background-color: rgb(255, 255, 255);\">Reflected XSS (or Non-Persistent) - The server reads data directly from the HTTP request and reflects it back in</span><br><span style=\"background-color: rgb(255, 255, 255);\">the HTTP response. Reflected XSS exploits occur when an attacker causes a victim to supply dangerous content to a</span><br><span style=\"background-color: rgb(255, 255, 255);\">vulnerable web application, which is then reflected back to the victim and executed by the web browser. The most</span><br><span style=\"background-color: rgb(255, 255, 255);\">common mechanism for delivering malicious content is to include it as a parameter in a URL that is posted publicly or emailed directly to the victim. URLs constructed in this manner constitute the core of many phishing schemes, whereby</span><br><span style=\"background-color: rgb(255, 255, 255);\">an attacker convinces a victim to visit a URL that refers to a vulnerable site. After the site reflects the attacker's content</span><br><span style=\"background-color: rgb(255, 255, 255);\">back to the victim, the content is executed by the victim's browser. </span>\n\n"}], "value": "\nGLPI - Reports plugin for GLPI Reflected Cross-Site-Scripting (RXSS).\nType 1: Reflected XSS (or Non-Persistent) - The server reads data directly from the HTTP request and reflects it back in\nthe HTTP response. Reflected XSS exploits occur when an attacker causes a victim to supply dangerous content to a\nvulnerable web application, which is then reflected back to the victim and executed by the web browser. The most\ncommon mechanism for delivering malicious content is to include it as a parameter in a URL that is posted publicly or emailed directly to the victim. URLs constructed in this manner constitute the core of many phishing schemes, whereby\nan attacker convinces a victim to visit a URL that refers to a vulnerable site. After the site reflects the attacker's content\nback to the victim, the content is executed by the victim's browser. \n\n"}], "metrics": [{"cvssV3_1": {"attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.1, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", "version": "3.1"}, "format": "CVSS", "scenarios": [{"lang": "en", "value": "GENERAL"}]}], "problemTypes": [{"descriptions": [{"cweId": "CWE-79", "description": "CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')", "lang": "en", "type": "CWE"}]}], "providerMetadata": {"orgId": "a57ee1ae-c9c1-4f40-aa7b-cf10760fde3f", "shortName": "INCD", "dateUpdated": "2023-10-25T13:21:24.847Z"}, "references": [{"url": "https://www.gov.il/en/Departments/faq/cve_advisories"}], "source": {"advisory": "ILVN-2022-0062", "discovery": "UNKNOWN"}, "title": "GLPI - Reports plugin for GLPI Reflected Cross-Site-Scripting (RXSS)", "x_generator": {"engine": "Vulnogram 0.1.0-dev"}}, "adp": [{"providerMetadata": {"orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE", "dateUpdated": "2024-08-03T12:00:43.784Z"}, "title": "CVE Program Container", "references": [{"url": "https://www.gov.il/en/Departments/faq/cve_advisories", "tags": ["x_transferred"]}]}, {"metrics": [{"other": {"type": "ssvc", "content": {"timestamp": "2025-04-29T19:48:07.392257Z", "id": "CVE-2022-39181", "options": [{"Exploitation": "none"}, {"Automatable": "no"}, {"Technical Impact": "partial"}], "role": "CISA Coordinator", "version": "2.0.3"}}}], "title": "CISA ADP Vulnrichment", "providerMetadata": {"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP", "dateUpdated": "2025-04-29T19:48:20.822Z"}}]}, "cveMetadata": {"assignerOrgId": "a57ee1ae-c9c1-4f40-aa7b-cf10760fde3f", "cveId": "CVE-2022-39181", "serial": 1, "state": "PUBLISHED", "dateUpdated": "2025-04-29T19:48:20.822Z", "dateReserved": "2022-09-02T00:00:00.000Z", "datePublished": "2022-11-17T22:27:54.504Z", "assignerShortName": "INCD"}, "dataType": "CVE_RECORD", "dataVersion": "5.1"}