Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2022-28117

EPSS 67.13% · P99
Get alerts for future matching vulnerabilitiesLog in to subscribe

I. Basic Information for CVE-2022-28117

Vulnerability Information

Have questions about the vulnerability? See if Shenlong's analysis helps!
View Shenlong Deep Dive ↗

Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.

Vulnerability Title
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Description
A Server-Side Request Forgery (SSRF) in feed_parser class of Navigate CMS v2.9.4 allows remote attackers to force the application to make arbitrary requests via injection of arbitrary URLs into the feed parameter.
Source: NVD (National Vulnerability Database)
CVSS Information
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Type
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Title
Navigate CMS 代码问题漏洞
Source: CNNVD (China National Vulnerability Database)
Vulnerability Description
Naviwebs Navigate CMS是美国Naviwebs公司的一套开源的内容管理系统(CMS)。 Navigate CMS v2.9.4存在安全漏洞,该漏洞允许远程攻击者通过将任意 URL 注入到 feed 参数中来强制应用程序发出任意请求。
Source: CNNVD (China National Vulnerability Database)
CVSS Information
N/A
Source: CNNVD (China National Vulnerability Database)
Vulnerability Type
N/A
Source: CNNVD (China National Vulnerability Database)

Shenlong Deep Dive — AI Deep Analysis

10-question deep dive: root cause, exploitation, mitigation, urgency. Read summary free, full version requires login.

Affected Products

VendorProductAffected VersionsCPESubscribe
-n/a n/a -

II. Public POCs for CVE-2022-28117

#POC DescriptionSource LinkShenlong Link
1Navigate CMS <= 2.9.4 - Server-Side Request Forgery (Authenticated)https://github.com/cheshireca7/CVE-2022-28117POC Details
2Nonehttps://github.com/kimstars/POC-CVE-2022-28117POC Details
3Navigate CMS 2.9.4 is susceptible to server-side request forgery via feed_parser class. This can allow a remote attacker to force the application to make arbitrary requests via injection of arbitrary URLs into the feed parameter, thus enabling possible theft of sensitive information, data modification, and/or unauthorized operation execution. https://github.com/projectdiscovery/nuclei-templates/blob/main/http/cves/2022/CVE-2022-28117.yamlPOC Details
AI-Generated POCPremium

No public POC found.

Login to generate AI POC

III. Intelligence Information for CVE-2022-28117

登录查看更多情报信息。

Same Patch Batch · n/a · 2022-04-28 · 20 CVEs total

CVE-2022-28114DESHANG DSCMS 安全漏洞
CVE-2022-29869cifs-utils 日志信息泄露漏洞
CVE-2022-28892Mahara 跨站请求伪造漏洞
CVE-2021-33436NoMachine 安全漏洞
CVE-2021-41921NovelPlus 代码问题漏洞
CVE-2022-29152Ericom PowerTerm WebConnect 跨站脚本漏洞
CVE-2022-24935Lexmark 访问控制错误漏洞
CVE-2021-41945Encode OSS httpx 输入验证错误漏洞
CVE-2022-28101Lyon Bros Turtlapp Turtle Note 跨站脚本漏洞
CVE-2022-28102PHP MySQL Admin Panel Generator 跨站脚本漏洞
CVE-2022-24449Solar appScreener 代码问题漏洞
CVE-2022-29584Mahara 跨站脚本漏洞
CVE-2022-29585Mahara 安全漏洞
CVE-2022-29081oVirt REST API 路径遍历漏洞
CVE-2022-28060Victor CMS SQL注入漏洞
CVE-2022-28477WBCE CMS 跨站脚本漏洞
CVE-2022-29555Northern.tech Mender Enterprise 跨站请求伪造漏洞
CVE-2022-29556Northern.tech Mender Enterprise 代码问题漏洞
CVE-2022-28454Limbas 跨站脚本漏洞

IV. Related Vulnerabilities

V. Comments for CVE-2022-28117

No comments yet


Leave a comment