CVE-2023-2822

Scores

EPSS

0.837high83.7%
0%20%40%60%80%100%

Percentile: 83.7%

CVSS

6.1medium3.x
0246810

CVSS Score: 6.1/10

All CVSS Scores

CVSS 3.x
6.1

Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N

CVSS 2.0
5.0

Vector: AV:N/AC:L/Au:N/C:N/I:P/A:N

Description

A vulnerability was found in Ellucian Ethos Identity up to 5.10.5. It has been classified as problematic. Affected is an unknown function of the file /cas/logout. The manipulation of the argument url leads to cross site scripting. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. Upgrading to version 5.10.6 is able to address this issue. It is recommended to upgrade the affected component. The identifier of this vulnerability is VDB-229596.

Scaner-VS 7 — a modern vulnerability management solution

Uses this database for vulnerability detection. High-speed search, cross-platform, advanced configuration audit, and flexible filtering. Suitable for organizations of any size.
Learn more about Scaner-VS 7

Sources

nvd

CWEs

CWE-79

Exploits

Exploit ID: CVE-2023-2822

Source: github-poc

URL: https://github.com/cberman/CVE-2023-2822-demo

Vulnerable Software (1)

Type: Configuration

Vendor: *

Product: ethos_identity

Operating System: * * *

Trait:
{  "cpe_match": [    {      "cpe23uri": "cpe:2.3:a:ellucian:ethos_identity:*:*:*:*:*:*:*:*",      "versionEndExcluding": "5.10.6",      "vulnerable": true    }  ],  "operator": "OR"}

Source: nvd

End of list