Sysaid – Pro Plus Edition, SysAid Help Desk Broken Access Control v20.4.74 b10, v22.1.20 b62, v22.1.30 b49 - An attacker needs to log in as a guest after that the system redirects him to the service portal or EndUserPortal.JSP, then he needs to change the path in the URL to /ConcurrentLogin%2ejsp after that he will receive an error message with a login button, by clicking on it, he will connect to the system dashboard. The attacker can receive sensitive data like server details, usernames, workstations, etc. He can also perform actions such as uploading files, deleting calls from the system.
References
Link Resource
https://www.gov.il/en/departments/faq/cve_advisories Third Party Advisory
History

No history.

cve-icon MITRE Information

Status: PUBLISHED

Assigner: INCD

Published: 2022-05-09T00:00:00

Updated: 2022-05-12T19:48:42

Reserved: 2022-01-07T00:00:00


Link: CVE-2022-22798

JSON object: View

cve-icon NVD Information

Status : Analyzed

Published: 2022-05-12T20:15:14.977

Modified: 2023-08-08T14:22:24.967


Link: CVE-2022-22798

JSON object: View

cve-icon Redhat Information

No data.