CVE-2022-38130

The com.keysight.tentacle.config.ResourceManager.smsRestoreDatabaseZip() method is used to restore the HSQLDB database used in SMS. It takes the path of the zipped database file as the single parameter. An unauthenticated, remote attacker can specify an UNC path for the database file (i.e., \\<attacker-host>\sms\<attacker-db.zip>), effectively controlling the content of the database to be restored.
References
Link Resource
https://www.tenable.com/security/research/tra-2022-28 Third Party Advisory
Configurations

Configuration 1 (hide)

cpe:2.3:a:keysight:sensor_management_server:2.4.0:*:*:*:*:*:*:*

History

15 Aug 2022, 16:11

Type Values Removed Values Added
CWE CWE-89
CPE cpe:2.3:a:keysight:sensor_management_server:2.4.0:*:*:*:*:*:*:*
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 9.8
References (MISC) https://www.tenable.com/security/research/tra-2022-28 - (MISC) https://www.tenable.com/security/research/tra-2022-28 - Third Party Advisory

10 Aug 2022, 20:16

Type Values Removed Values Added
New CVE

Information

Published : 2022-08-10 20:16

Updated : 2024-02-04 22:51


NVD link : CVE-2022-38130

Mitre link : CVE-2022-38130

CVE.ORG link : CVE-2022-38130


JSON object : View

Products Affected

keysight

  • sensor_management_server
CWE
CWE-89

Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')