DELL EMC AppSync versions 3.9 to 4.3 use GET request method with sensitive query strings. An Adjacent, unauthenticated attacker could potentially exploit this vulnerability, and hijack the victim session.
References
| Link | Resource |
|---|---|
| https://www.dell.com/support/kbdoc/000195377 | Patch Vendor Advisory |
| https://www.dell.com/support/kbdoc/000195377 | Patch Vendor Advisory |
Configurations
History
21 Nov 2024, 06:47
| Type | Values Removed | Values Added |
|---|---|---|
| References | () https://www.dell.com/support/kbdoc/000195377 - Patch, Vendor Advisory | |
| CVSS |
v2 : v3 : |
v2 : 5.8
v3 : 8.3 |
27 Jan 2022, 15:00
| Type | Values Removed | Values Added |
|---|---|---|
| References | (MISC) https://www.dell.com/support/kbdoc/000195377 - Patch, Vendor Advisory | |
| CWE | CWE-384 | |
| CVSS |
v2 : v3 : |
v2 : 5.8
v3 : 8.8 |
| CPE | cpe:2.3:a:dell:emc_appsync:*:*:*:*:*:*:*:* |
21 Jan 2022, 21:15
| Type | Values Removed | Values Added |
|---|---|---|
| New CVE |
Information
Published : 2022-01-21 21:15
Updated : 2024-11-21 06:47
NVD link : CVE-2022-22551
Mitre link : CVE-2022-22551
CVE.ORG link : CVE-2022-22551
JSON object : View
Products Affected
dell
- emc_appsync
