CVE-2022-3193: CWE-79 in ovirt-engine
An HTML injection/reflected Cross-site scripting (XSS) vulnerability was found in the ovirt-engine. A parameter "error_description" fails to sanitize the entry, allowing the vulnerability to trigger on the Windows Service Accounts home pages.
AI Analysis
Technical Summary
CVE-2022-3193 is a medium-severity reflected Cross-site Scripting (XSS) vulnerability classified under CWE-79, affecting the ovirt-engine version 4.3. The vulnerability arises from improper sanitization of the "error_description" parameter, which is reflected on the Windows Service Accounts home pages within the ovirt-engine management interface. Because the input is not properly sanitized, an attacker can inject malicious HTML or JavaScript code that executes in the context of the victim's browser session. This can lead to the theft of session tokens, redirection to malicious sites, or execution of arbitrary scripts, potentially compromising the confidentiality and integrity of the user's session. The vulnerability is exploitable remotely over the network without requiring authentication, but it does require user interaction (the user must visit a crafted URL or page). The CVSS v3.1 base score is 6.1, indicating a medium severity level, with an attack vector of network (AV:N), low attack complexity (AC:L), no privileges required (PR:N), user interaction required (UI:R), scope changed (S:C), and impacts on confidentiality and integrity but not availability (C:L/I:L/A:N). No known exploits are reported in the wild, and no official patches are linked in the provided data, though it is likely that vendors or maintainers have addressed this in subsequent releases or advisories. The vulnerability affects a specific version of ovirt-engine, an open-source virtualization management platform widely used in enterprise environments for managing virtual machines and data center resources.
Potential Impact
For European organizations using ovirt-engine 4.3, this vulnerability poses a risk primarily to administrators or users accessing the Windows Service Accounts pages within the management interface. Successful exploitation could allow attackers to hijack sessions or perform actions on behalf of legitimate users, potentially leading to unauthorized access to virtualization management functions. This could result in unauthorized changes to virtual machine configurations, exposure of sensitive infrastructure details, or pivoting to other internal systems. Given that virtualization platforms are critical infrastructure components in many European enterprises, especially in sectors like finance, government, and telecommunications, exploitation could disrupt operations or lead to data breaches. However, the requirement for user interaction and the reflected nature of the XSS somewhat limit the attack surface. The lack of known exploits in the wild reduces immediate risk, but the presence of this vulnerability in a core management tool means that targeted attacks against European organizations using this software could be impactful if leveraged.
Mitigation Recommendations
European organizations should prioritize upgrading ovirt-engine to a version where this vulnerability is patched. If an upgrade is not immediately possible, implementing web application firewalls (WAFs) with rules to detect and block malicious input patterns targeting the "error_description" parameter can reduce risk. Administrators should also enforce strict Content Security Policy (CSP) headers on the ovirt-engine web interface to limit the execution of injected scripts. User training to recognize suspicious URLs and avoid clicking on untrusted links can mitigate the risk of user interaction exploitation. Additionally, monitoring web server logs for unusual parameter values or repeated attempts to inject scripts can help detect exploitation attempts early. Regular vulnerability scanning and penetration testing focused on the management interface should be conducted to identify any residual or related issues.
Affected Countries
Germany, France, United Kingdom, Netherlands, Italy, Spain, Poland
CVE-2022-3193: CWE-79 in ovirt-engine
Description
An HTML injection/reflected Cross-site scripting (XSS) vulnerability was found in the ovirt-engine. A parameter "error_description" fails to sanitize the entry, allowing the vulnerability to trigger on the Windows Service Accounts home pages.
AI-Powered Analysis
Technical Analysis
CVE-2022-3193 is a medium-severity reflected Cross-site Scripting (XSS) vulnerability classified under CWE-79, affecting the ovirt-engine version 4.3. The vulnerability arises from improper sanitization of the "error_description" parameter, which is reflected on the Windows Service Accounts home pages within the ovirt-engine management interface. Because the input is not properly sanitized, an attacker can inject malicious HTML or JavaScript code that executes in the context of the victim's browser session. This can lead to the theft of session tokens, redirection to malicious sites, or execution of arbitrary scripts, potentially compromising the confidentiality and integrity of the user's session. The vulnerability is exploitable remotely over the network without requiring authentication, but it does require user interaction (the user must visit a crafted URL or page). The CVSS v3.1 base score is 6.1, indicating a medium severity level, with an attack vector of network (AV:N), low attack complexity (AC:L), no privileges required (PR:N), user interaction required (UI:R), scope changed (S:C), and impacts on confidentiality and integrity but not availability (C:L/I:L/A:N). No known exploits are reported in the wild, and no official patches are linked in the provided data, though it is likely that vendors or maintainers have addressed this in subsequent releases or advisories. The vulnerability affects a specific version of ovirt-engine, an open-source virtualization management platform widely used in enterprise environments for managing virtual machines and data center resources.
Potential Impact
For European organizations using ovirt-engine 4.3, this vulnerability poses a risk primarily to administrators or users accessing the Windows Service Accounts pages within the management interface. Successful exploitation could allow attackers to hijack sessions or perform actions on behalf of legitimate users, potentially leading to unauthorized access to virtualization management functions. This could result in unauthorized changes to virtual machine configurations, exposure of sensitive infrastructure details, or pivoting to other internal systems. Given that virtualization platforms are critical infrastructure components in many European enterprises, especially in sectors like finance, government, and telecommunications, exploitation could disrupt operations or lead to data breaches. However, the requirement for user interaction and the reflected nature of the XSS somewhat limit the attack surface. The lack of known exploits in the wild reduces immediate risk, but the presence of this vulnerability in a core management tool means that targeted attacks against European organizations using this software could be impactful if leveraged.
Mitigation Recommendations
European organizations should prioritize upgrading ovirt-engine to a version where this vulnerability is patched. If an upgrade is not immediately possible, implementing web application firewalls (WAFs) with rules to detect and block malicious input patterns targeting the "error_description" parameter can reduce risk. Administrators should also enforce strict Content Security Policy (CSP) headers on the ovirt-engine web interface to limit the execution of injected scripts. User training to recognize suspicious URLs and avoid clicking on untrusted links can mitigate the risk of user interaction exploitation. Additionally, monitoring web server logs for unusual parameter values or repeated attempts to inject scripts can help detect exploitation attempts early. Regular vulnerability scanning and penetration testing focused on the management interface should be conducted to identify any residual or related issues.
Affected Countries
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- redhat
- Date Reserved
- 2022-09-13T00:00:00.000Z
- Cisa Enriched
- true
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 682ce77b4d7c5ea9f4b397bb
Added to database: 5/20/2025, 8:35:07 PM
Last enriched: 7/6/2025, 6:25:36 AM
Last updated: 2/7/2026, 2:57:53 PM
Views: 40
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2026-2088: SQL Injection in PHPGurukul Beauty Parlour Management System
MediumCVE-2026-2087: SQL Injection in SourceCodester Online Class Record System
MediumCVE-2026-2086: Buffer Overflow in UTT HiPER 810G
HighOrganizations Urged to Replace Discontinued Edge Devices
MediumCVE-2026-2085: Command Injection in D-Link DWR-M921
HighActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.