U.S. flag   An official website of the United States government
Dot gov

Official websites use .gov
A .gov website belongs to an official government organization in the United States.

Https

Secure .gov websites use HTTPS
A lock (Dot gov) or https:// means you've safely connected to the .gov website. Share sensitive information only on official, secure websites.

Vulnerability Change Records for CVE-2022-39181

Change History

CVE Modified by Israel National Cyber Directorate 10/25/2023 2:17:15 PM

Action Type Old Value New Value
Added CVSS V3.1

								
							
							
						
Israel National Cyber Directorate AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
Removed CVSS V3.1
Israel National Cyber Directorate AV:A/AC:L/PR:L/UI:R/S:U/C:L/I:L/A:L

								
						
Removed CVSS V3.1 Reason
A-No availability impacts identified

								
						
Removed CVSS V3.1 Reason
AV-Applied AV:N due to network vector identified

								
						
Removed CVSS V3.1 Reason
PR-No privileges needed

								
						
Removed CVSS V3.1 Reason
S-Security boundary

								
						
Changed Description
GLPI - Reports plugin for GLPI Reflected Cross-Site-Scripting (RXSS). Type 1: Reflected XSS (or Non-Persistent) - The server reads data directly from the HTTP request and reflects it back in the HTTP response. Reflected XSS exploits occur when an attacker causes a victim to supply dangerous content to a vulnerable web application, which is then reflected back to the victim and executed by the web browser. The most common mechanism for delivering malicious content is to include it as a parameter in a URL that is posted publicly or emailed directly to the victim. URLs constructed in this manner constitute the core of many phishing schemes, whereby an attacker convinces a victim to visit a URL that refers to a vulnerable site. After the site reflects the attacker's content back to the victim, the content is executed by the victim's browser.
GLPI - Reports plugin for GLPI Reflected Cross-Site-Scripting (RXSS).
Type 1: Reflected XSS (or Non-Persistent) - The server reads data directly from the HTTP request and reflects it back in
the HTTP response. Reflected XSS exploits occur when an attacker causes a victim to supply dangerous content to a
vulnerable web application, which is then reflected back to the victim and executed by the web browser. The most
common mechanism for delivering malicious content is to include it as a parameter in a URL that is posted publicly or emailed directly to the victim. URLs constructed in this manner constitute the core of many phishing schemes, whereby
an attacker convinces a victim to visit a URL that refers to a vulnerable site. After the site reflects the attacker's content
back to the victim, the content is executed by the victim's browser. 

Added Reference

								
							
							
						
https://www.gov.il/en/Departments/faq/cve_advisories [No Types Assigned]
Removed Reference
https://www.gov.il/en/departments/faq/cve_advisories [Third Party Advisory]