Advisory ID | NN-2023:4-01 |
---|---|
Topic | Stored Cross-Site Scripting (XSS) in Threat Intelligence rules in Guardian/CMC before 22.6.2 |
CWE Impact | CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') |
Issue date | 2023-08-09 |
Affects | Guardian, CMC < v22.6.2 |
CVE Name(s) | CVE-2023-22843 |
CVSS Details | CVSS:4.0/AV:N/AC:H/AT:N/PR:H/UI:P/VC:H/VI:H/VA:L/SC:N/SI:N/SA:N CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:U/C:H/I:H/A:L |
CVSS Score | 7.3 (CVSS v4.0) 6.4 (CVSS v3.1) |
CVE Risk Level | High (CVSS v4.0) Medium (CVSS v3.1) |
Risk Level for Nozomi customers | Low |
An authenticated attacker with administrative access to the web management interface can inject malicious JavaScript code inside the definition of a Threat Intelligence rule, that will be stored and can later be executed by another legitimate user viewing the details of such a rule.
Via stored Cross-Site Scripting (XSS), an attacker may be able to perform unauthorized actions on behalf of legitimate users and/or gather sensitive information. JavaScript injection was possible in the contents for Yara rules, while limited HTML injection has been proven for packet and STYX rules.
Guardian, CMC < v22.6.2
Use internal firewall features to limit access to the web management interface.
Upgrade to v22.6.2 or later.
We thank the following parties for their efforts: