CVE-2022-48325

Multiple Cross Site Scripting (XSS) vulnerabilities in Mapos 4.39.0 allow attackers to execute arbitrary code. Affects the following parameters: (1) year, (2) oldSenha, (3) novaSenha, (4) termo, (5) nome, (6) cnpj, (7) ie, (8) cep, (9) logradouro, (10) numero, (11) bairro, (12) cidade, (13) uf, (14) telefone, (15) email, (16) id, (17) app_name, (18) per_page, (19) app_theme, (20) os_notification, (21) email_automatico, (22) control_estoque, (23) notifica_whats, (24) control_baixa, (25) control_editos, (26) control_edit_vendas, (27) control_datatable, (28) pix_key, (29) os_status_list, (30) control_2vias, (31) status, (32) start, (33) end in file application/controllers/Mapos.php; (34) token, (35) senha, (36) email, (37) nomeCliente, (38) documento, (39) telefone, (40) celular, (41) rua, (42) numero, (43) complemento, (44) bairro, (45) cidade, (46) estado, (47) cep, (48) idClientes, (49) descricaoProduto, (50) defeito in file application/controllers/Mine.php; (51) pesquisa, (52) status, (53) data, (54) data2, (55) dataInicial, (56) dataFinal, (57) termoGarantia, (58) garantias_id, (59) clientes_id, (60) usuarios_id, (61) idOs, (62) garantia, (63) descricaoProduto, (64) defeito, (65) observacoes, (66) laudoTecnico, (67) id, (68) preco, (69) quantidade, (70) idProduto, (71) idOsProduto, (72) produto, (73) idServico, (74) idOsServico, (75) desconto, (76) tipoDesconto, (77) resultado, (78) vencimento, (79) recebimento, (80) os_id, (81) valor, (82) recebido, (83) formaPgto, (84) tipo, (85) anotacao, (86) idAnotacao in file application/controllers/Os.php.
Configurations

Configuration 1 (hide)

cpe:2.3:a:mapos:map-os:4.39.0:*:*:*:*:*:*:*

History

21 Nov 2024, 07:33

Type Values Removed Values Added
References () https://gist.github.com/enferas/7c7f0a3c6cb30939d9039043c0b86ea8 - Exploit, Vendor Advisory () https://gist.github.com/enferas/7c7f0a3c6cb30939d9039043c0b86ea8 - Exploit, Vendor Advisory
References () https://github.com/RamonSilva20/mapos/issues/2010 - Exploit, Issue Tracking, Vendor Advisory () https://github.com/RamonSilva20/mapos/issues/2010 - Exploit, Issue Tracking, Vendor Advisory
References () https://github.com/RamonSilva20/mapos/pull/2015#pullrequestreview-1271395780 - Patch, Vendor Advisory () https://github.com/RamonSilva20/mapos/pull/2015#pullrequestreview-1271395780 - Patch, Vendor Advisory

27 Feb 2023, 16:22

Type Values Removed Values Added
CPE cpe:2.3:a:mapos:map-os:4.39.0:*:*:*:*:*:*:*
CWE CWE-79
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 6.1
References (MISC) https://github.com/RamonSilva20/mapos/pull/2015#pullrequestreview-1271395780 - (MISC) https://github.com/RamonSilva20/mapos/pull/2015#pullrequestreview-1271395780 - Patch, Vendor Advisory
References (MISC) https://gist.github.com/enferas/7c7f0a3c6cb30939d9039043c0b86ea8 - (MISC) https://gist.github.com/enferas/7c7f0a3c6cb30939d9039043c0b86ea8 - Exploit, Vendor Advisory
References (MISC) https://github.com/RamonSilva20/mapos/issues/2010 - (MISC) https://github.com/RamonSilva20/mapos/issues/2010 - Exploit, Issue Tracking, Vendor Advisory

17 Feb 2023, 12:52

Type Values Removed Values Added
New CVE

Information

Published : 2023-02-16 21:15

Updated : 2025-03-19 15:15


NVD link : CVE-2022-48325

Mitre link : CVE-2022-48325

CVE.ORG link : CVE-2022-48325


JSON object : View

Products Affected

mapos

  • map-os
CWE
CWE-79

Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')