Skip to main content

CVE-2022-24967: n/a in n/a

Medium
VulnerabilityCVE-2022-24967cvecve-2022-24967
Published: Sun May 29 2022 (05/29/2022, 17:35:56 UTC)
Source: CVE Database V5
Vendor/Project: n/a
Product: n/a

Description

Black Rainbow NIMBUS before 3.7.0 allows stored Cross-site Scripting (XSS).

AI-Powered Analysis

AILast updated: 07/08/2025, 15:41:07 UTC

Technical Analysis

CVE-2022-24967 is a stored Cross-site Scripting (XSS) vulnerability affecting Black Rainbow NIMBUS versions prior to 3.7.0. Stored XSS vulnerabilities occur when malicious scripts are injected into a web application and then permanently stored on the target server, such as in a database, message forum, visitor log, comment field, or other data storage mechanisms. When other users access the affected content, the malicious script executes in their browsers, potentially leading to session hijacking, credential theft, or other malicious activities. This specific vulnerability requires low attack complexity (AC:L) and no network authentication (PR:L indicates low privileges required, but some privileges are needed), but user interaction is required (UI:R), meaning the victim must interact with the malicious content for the exploit to succeed. The vulnerability impacts confidentiality and integrity, with a CVSS v3.1 base score of 6.5 (medium severity). The scope is changed (S:C), indicating that the vulnerability affects resources beyond the initially vulnerable component. The lack of vendor and product details limits precise identification, but the vulnerability is confirmed in Black Rainbow NIMBUS before version 3.7.0. No known exploits are currently reported in the wild, and no official patches or mitigation links are provided in the source data. Stored XSS vulnerabilities are significant because they can be leveraged for persistent attacks against users of the affected application, potentially compromising sensitive data and user trust.

Potential Impact

For European organizations using Black Rainbow NIMBUS, this vulnerability could lead to unauthorized disclosure of sensitive information, session hijacking, and potential compromise of user accounts or administrative functions. Given the stored nature of the XSS, attackers can craft persistent malicious payloads that affect multiple users over time. This could result in reputational damage, regulatory non-compliance (e.g., GDPR violations due to data breaches), and operational disruptions. Organizations in sectors with high regulatory scrutiny such as finance, healthcare, and government are particularly at risk. The requirement for user interaction means phishing or social engineering could be used to lure users into triggering the exploit. The medium severity score suggests a moderate but tangible risk that should be addressed promptly to avoid escalation or chaining with other vulnerabilities.

Mitigation Recommendations

1. Upgrade Black Rainbow NIMBUS to version 3.7.0 or later, where the vulnerability is fixed. 2. If immediate upgrade is not possible, implement strict input validation and output encoding on all user-supplied data to prevent script injection and execution. 3. Employ Content Security Policy (CSP) headers to restrict the execution of unauthorized scripts in browsers. 4. Conduct regular security audits and penetration testing focusing on XSS vectors within the application. 5. Educate users about phishing and social engineering tactics to reduce the risk of triggering malicious payloads. 6. Monitor application logs for unusual activity that could indicate exploitation attempts. 7. Use web application firewalls (WAFs) configured to detect and block XSS attack patterns as an additional layer of defense.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
mitre
Date Reserved
2022-02-11T00:00:00.000Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 6839d93e182aa0cae2b72fe5

Added to database: 5/30/2025, 4:13:50 PM

Last enriched: 7/8/2025, 3:41:07 PM

Last updated: 8/6/2025, 6:29:49 PM

Views: 14

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats