Show plain JSON{"configurations": [{"nodes": [{"cpeMatch": [{"criteria": "cpe:2.3:a:netscout:ngeniusone:6.3.2:build904:*:*:*:*:*:*", "matchCriteriaId": "47C284CB-BC1D-48C5-BFCA-7702FAB68365", "vulnerable": true}], "negate": false, "operator": "OR"}]}], "cveTags": [], "descriptions": [{"lang": "en", "value": "An issue was discovered in NetScout nGeniusONE 6.3.2 build 904. Open Redirection can occur (issue 2 of 2). After successful login, an attacker must visit the vulnerable parameter and inject a crafted payload to successfully redirect to an unknown host. The attack vector is Network, and the Attack Complexity required is High. Privileges required are administrator, User Interaction is required, and Scope is unchanged. The user must visit the vulnerable parameter and inject a crafted payload to successfully redirect to an unknown host."}, {"lang": "es", "value": "Se descubri\u00f3 un problema en NetScout nGeniusONE 6.3.2 build 904. Puede ocurrir una redirecci\u00f3n abierta (problema 2 de 2). Despu\u00e9s de iniciar sesi\u00f3n correctamente, un atacante debe visitar el par\u00e1metro vulnerable e inyectar un payload manipulado para redirigir exitosamente a un host desconocido. El vector de ataque es la red y la complejidad del ataque requerida es alta. Los privilegios requeridos son de administrador, se requiere interacci\u00f3n del usuario y el alcance no cambia. El usuario debe visitar el par\u00e1metro vulnerable e inyectar un payload manipulado para redirigir exitosamente a un host desconocido."}], "id": "CVE-2022-44718", "lastModified": "2025-03-28T16:15:21.190", "metrics": {"cvssMetricV31": [{"cvssData": {"attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 3.5, "baseSeverity": "LOW", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:U/C:L/I:L/A:N", "version": "3.1"}, "exploitabilityScore": 0.9, "impactScore": 2.5, "source": "nvd@nist.gov", "type": "Primary"}, {"cvssData": {"attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 3.5, "baseSeverity": "LOW", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:U/C:L/I:L/A:N", "version": "3.1"}, "exploitabilityScore": 0.9, "impactScore": 2.5, "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary"}]}, "published": "2023-01-27T14:15:11.347", "references": [{"source": "cve@mitre.org", "tags": ["Vendor Advisory"], "url": "https://www.netscout.com/securityadvisories"}, {"source": "af854a3a-2127-422b-91ae-364da2661108", "tags": ["Vendor Advisory"], "url": "https://www.netscout.com/securityadvisories"}], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [{"description": [{"lang": "en", "value": "CWE-601"}], "source": "nvd@nist.gov", "type": "Primary"}, {"description": [{"lang": "en", "value": "CWE-601"}], "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary"}]}