ID

VAR-202212-1053


CVE

CVE-2022-25630


TITLE

Symantec's  Symantec Messaging Gateway  Cross-site scripting vulnerability in

Trust: 0.8

sources: JVNDB: JVNDB-2022-022591

DESCRIPTION

An authenticated user can embed malicious content with XSS into the admin group policy page. Symantec's Symantec Messaging Gateway Exists in a cross-site scripting vulnerability.Information may be obtained and information may be tampered with

Trust: 1.8

sources: NVD: CVE-2022-25630 // JVNDB: JVNDB-2022-022591 // VULHUB: VHN-416450 // VULMON: CVE-2022-25630

AFFECTED PRODUCTS

vendor:symantecmodel:messaging gatewayscope:ltversion:10.8

Trust: 1.0

vendor:シマンテックmodel:symantec messaging gatewayscope: - version: -

Trust: 0.8

vendor:シマンテックmodel:symantec messaging gatewayscope:eqversion:10.8

Trust: 0.8

vendor:シマンテックmodel:symantec messaging gatewayscope:eqversion: -

Trust: 0.8

sources: JVNDB: JVNDB-2022-022591 // NVD: CVE-2022-25630

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2022-25630
value: MEDIUM

Trust: 1.0

NVD: CVE-2022-25630
value: MEDIUM

Trust: 0.8

CNNVD: CNNVD-202212-2782
value: MEDIUM

Trust: 0.6

nvd@nist.gov: CVE-2022-25630
baseSeverity: MEDIUM
baseScore: 5.4
vectorString: CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N
attackVector: NETWORK
attackComplexity: LOW
privilegesRequired: LOW
userInteraction: REQUIRED
scope: CHANGED
confidentialityImpact: LOW
integrityImpact: LOW
availabilityImpact: NONE
exploitabilityScore: 2.3
impactScore: 2.7
version: 3.1

Trust: 1.0

NVD: CVE-2022-25630
baseSeverity: MEDIUM
baseScore: 5.4
vectorString: CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N
attackVector: NETWORK
attackComplexity: LOW
privilegesRequired: LOW
userInteraction: REQUIRED
scope: CHANGED
confidentialityImpact: LOW
integrityImpact: LOW
availabilityImpact: NONE
exploitabilityScore: NONE
impactScore: NONE
version: 3.0

Trust: 0.8

sources: JVNDB: JVNDB-2022-022591 // CNNVD: CNNVD-202212-2782 // NVD: CVE-2022-25630

PROBLEMTYPE DATA

problemtype:CWE-79

Trust: 1.1

problemtype:Cross-site scripting (CWE-79) [NVD evaluation ]

Trust: 0.8

sources: VULHUB: VHN-416450 // JVNDB: JVNDB-2022-022591 // NVD: CVE-2022-25630

THREAT TYPE

remote

Trust: 0.6

sources: CNNVD: CNNVD-202212-2782

TYPE

XSS

Trust: 0.6

sources: CNNVD: CNNVD-202212-2782

PATCH

title:Broadcom Symantec Messaging Gateway Fixes for cross-site scripting vulnerabilitiesurl:http://123.124.177.30/web/xxk/bdxqById.tag?id=217194

Trust: 0.6

sources: CNNVD: CNNVD-202212-2782

EXTERNAL IDS

db:NVDid:CVE-2022-25630

Trust: 3.4

db:PACKETSTORMid:171781

Trust: 2.4

db:JVNDBid:JVNDB-2022-022591

Trust: 0.8

db:EXPLOIT-DBid:51342

Trust: 0.6

db:CNNVDid:CNNVD-202212-2782

Trust: 0.6

db:VULHUBid:VHN-416450

Trust: 0.1

db:VULMONid:CVE-2022-25630

Trust: 0.1

sources: VULHUB: VHN-416450 // VULMON: CVE-2022-25630 // JVNDB: JVNDB-2022-022591 // CNNVD: CNNVD-202212-2782 // NVD: CVE-2022-25630

REFERENCES

url:https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/securityadvisories/0/21117

Trust: 2.5

url:http://packetstormsecurity.com/files/171781/symantec-messaging-gateway-10.7.4-cross-site-scripting.html

Trust: 2.4

url:https://nvd.nist.gov/vuln/detail/cve-2022-25630

Trust: 0.8

url:https://support.broadcom.com/external/content/securityadvisories/0/21117

Trust: 0.7

url:https://cxsecurity.com/cveshow/cve-2022-25630/

Trust: 0.6

url:https://www.exploit-db.com/exploits/51342

Trust: 0.6

url:https://nvd.nist.gov

Trust: 0.1

sources: VULHUB: VHN-416450 // VULMON: CVE-2022-25630 // JVNDB: JVNDB-2022-022591 // CNNVD: CNNVD-202212-2782 // NVD: CVE-2022-25630

SOURCES

db:VULHUBid:VHN-416450
db:VULMONid:CVE-2022-25630
db:JVNDBid:JVNDB-2022-022591
db:CNNVDid:CNNVD-202212-2782
db:NVDid:CVE-2022-25630

LAST UPDATE DATE

2024-08-14T15:21:28.142000+00:00


SOURCES UPDATE DATE

db:VULHUBid:VHN-416450date:2023-01-30T00:00:00
db:VULMONid:CVE-2022-25630date:2022-12-09T00:00:00
db:JVNDBid:JVNDB-2022-022591date:2023-11-17T08:22:00
db:CNNVDid:CNNVD-202212-2782date:2023-04-11T00:00:00
db:NVDid:CVE-2022-25630date:2023-04-10T20:15:07.797

SOURCES RELEASE DATE

db:VULHUBid:VHN-416450date:2022-12-09T00:00:00
db:VULMONid:CVE-2022-25630date:2022-12-09T00:00:00
db:JVNDBid:JVNDB-2022-022591date:2023-11-17T00:00:00
db:CNNVDid:CNNVD-202212-2782date:2022-12-09T00:00:00
db:NVDid:CVE-2022-25630date:2022-12-09T18:15:18.270