Vulnerabilities (CVE)

Filtered by vendor Mitre Subscribe
Total 14 CVE
CVE Vendors Products Updated CVSS v2 CVSS v3
CVE-2022-40606 1 Mitre 1 Caldera 2024-02-04 N/A 6.1 MEDIUM
MITRE CALDERA before 4.1.0 allows XSS in the Operations tab and/or Debrief plugin via a crafted operation name, a different vulnerability than CVE-2022-40605.
CVE-2022-41139 1 Mitre 1 Caldera 2024-02-04 N/A 5.4 MEDIUM
MITRE CALDERA 4.1.0 allows stored XSS via app.contact.gist (aka the gist contact configuration field), leading to execution of arbitrary commands on agents.
CVE-2022-40605 1 Mitre 1 Caldera 2024-02-04 N/A 6.1 MEDIUM
MITRE CALDERA before 4.1.0 allows XSS in the Operations tab and/or Debrief plugin via a crafted operation name, a different vulnerability than CVE-2022-40606.
CVE-2022-31004 1 Mitre 1 Cve-services 2024-02-04 5.0 MEDIUM 7.5 HIGH
CVEProject/cve-services is an open source project used to operate the CVE services API. A conditional in 'data.js' has potential for production secrets to be written to disk. The affected method writes the generated randomKey to disk if the environment is not development. If this method were called in production, it is possible that it would write the plaintext key to disk. A patch is not available as of time of publication but is anticipated as a "hot fix" for version 1.1.1 and for the 2.x branch.
CVE-2021-42561 1 Mitre 1 Caldera 2024-02-04 9.0 HIGH 8.8 HIGH
An issue was discovered in CALDERA 2.8.1. When activated, the Human plugin passes the unsanitized name parameter to a python "os.system" function. This allows attackers to use shell metacharacters (e.g., backticks "``" or dollar parenthesis "$()" ) in order to escape the current command and execute arbitrary shell commands.
CVE-2021-46561 1 Mitre 1 Cve Services 2024-02-04 6.5 MEDIUM 7.2 HIGH
controller/org.controller/org.controller.js in the CVE Services API 1.1.1 before 5c50baf3bda28133a3bc90b854765a64fb538304 allows an organizational administrator to transfer a user account to an arbitrary new organization, and thereby achieve unintended access within the context of that new organization.
CVE-2021-42560 1 Mitre 1 Caldera 2024-02-04 6.5 MEDIUM 8.8 HIGH
An issue was discovered in CALDERA 2.9.0. The Debrief plugin receives base64 encoded "SVG" parameters when generating a PDF document. These SVG documents are parsed in an unsafe manner and can be leveraged for XXE attacks (e.g., File Exfiltration, Server Side Request Forgery, Out of Band Exfiltration, etc.).
CVE-2021-42558 1 Mitre 1 Caldera 2024-02-04 4.3 MEDIUM 6.1 MEDIUM
An issue was discovered in CALDERA 2.8.1. It contains multiple reflected, stored, and self XSS vulnerabilities that may be exploited by authenticated and unauthenticated attackers.
CVE-2021-42559 1 Mitre 1 Caldera 2024-02-04 6.5 MEDIUM 8.8 HIGH
An issue was discovered in CALDERA 2.8.1. It contains multiple startup "requirements" that execute commands when starting the server. Because these commands can be changed via the REST API, an authenticated user can insert arbitrary commands that will execute when the server is restarted.
CVE-2021-42562 1 Mitre 1 Caldera 2024-02-04 5.5 MEDIUM 8.1 HIGH
An issue was discovered in CALDERA 2.8.1. It does not properly segregate user privileges, resulting in non-admin users having access to read and modify configuration or other components that should only be accessible by admin users.
CVE-2020-19907 1 Mitre 1 Caldera 2024-02-04 6.5 MEDIUM 8.8 HIGH
A command injection vulnerability in the sandcat plugin of Caldera 2.3.1 and earlier allows authenticated attackers to execute any command or service.
CVE-2020-10807 1 Mitre 1 Caldera 2024-02-04 5.0 MEDIUM 5.3 MEDIUM
auth_svc in Caldera before 2.6.5 allows authentication bypass (for REST API requests) via a forged "localhost" string in the HTTP Host header.
CVE-2020-14462 1 Mitre 1 Caldera 2024-02-04 3.5 LOW 5.4 MEDIUM
CALDERA 2.7.0 allows XSS via the Operation Name box.
CVE-2008-4704 1 Mitre 1 Sezhoo 2024-02-04 10.0 HIGH N/A
PHP remote file inclusion vulnerability in SezHooTabsAndActions.php in SezHoo 0.1 allows remote attackers to execute arbitrary PHP code via a URL in the IP parameter.