Skip to main content

CVE-2022-35196: n/a in n/a

High
VulnerabilityCVE-2022-35196cvecve-2022-35196
Published: Tue Sep 20 2022 (09/20/2022, 15:52:42 UTC)
Source: CVE Database V5
Vendor/Project: n/a
Product: n/a

Description

TestLink v1.9.20 was discovered to contain a Cross-Site Request Forgery (CSRF) via /lib/plan/planView.php.

AI-Powered Analysis

AILast updated: 07/08/2025, 03:10:09 UTC

Technical Analysis

CVE-2022-35196 is a high-severity vulnerability identified in TestLink version 1.9.20, involving a Cross-Site Request Forgery (CSRF) weakness via the /lib/plan/planView.php endpoint. TestLink is an open-source test management tool widely used for managing software testing processes. The vulnerability allows an attacker to trick an authenticated user into submitting a forged request to the vulnerable endpoint without their consent. This can lead to unauthorized actions being performed with the privileges of the victim user. The CVSS 3.1 base score of 8.8 reflects the critical nature of this flaw, indicating that the attack vector is network-based (AV:N), requires low attack complexity (AC:L), does not require privileges (PR:N), but does require user interaction (UI:R). The impact is severe across confidentiality, integrity, and availability (C:H/I:H/A:H), meaning an attacker can potentially access sensitive data, modify or delete data, and disrupt service availability. The vulnerability is categorized under CWE-352, which corresponds to CSRF attacks. Although no known exploits are reported in the wild, the vulnerability poses a significant risk due to the nature of the affected application and the high CVSS score. The lack of vendor or product-specific details in the provided data suggests that this vulnerability is specific to TestLink 1.9.20 and possibly earlier versions, but no patch links are provided, indicating that mitigation might require manual intervention or updates from the community or vendor.

Potential Impact

For European organizations, the impact of this vulnerability can be substantial, especially for those relying on TestLink for managing their software testing lifecycle. Successful exploitation could allow attackers to perform unauthorized actions such as altering test plans, deleting critical test data, or injecting malicious configurations, potentially leading to compromised software quality assurance processes. This could cascade into broader operational disruptions, data integrity issues, and loss of trust in software releases. Confidential information related to testing strategies and proprietary software details could be exposed, leading to intellectual property theft or competitive disadvantage. Additionally, availability impacts could delay critical software deployments or updates, affecting business continuity. Organizations in sectors with stringent regulatory requirements (e.g., finance, healthcare, and critical infrastructure) may face compliance risks if such vulnerabilities are exploited, potentially resulting in legal and reputational consequences.

Mitigation Recommendations

To mitigate this vulnerability effectively, European organizations should: 1) Immediately assess their use of TestLink version 1.9.20 and identify affected instances. 2) Apply any available patches or updates from the TestLink community or maintainers; if no official patch exists, consider upgrading to a newer, unaffected version. 3) Implement CSRF protection mechanisms such as synchronizer tokens or double-submit cookies in the application if customization is possible. 4) Restrict access to the TestLink application via network segmentation and enforce strict authentication and authorization controls to limit exposure. 5) Employ Web Application Firewalls (WAFs) with rules designed to detect and block CSRF attack patterns targeting the vulnerable endpoint. 6) Educate users about the risks of CSRF and encourage cautious behavior regarding unsolicited links or requests while authenticated. 7) Monitor logs and network traffic for suspicious activities related to /lib/plan/planView.php to detect potential exploitation attempts early. 8) Consider implementing multi-factor authentication (MFA) to reduce the risk of session hijacking that could facilitate CSRF attacks.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
mitre
Date Reserved
2022-07-04T00:00:00.000Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 68386826182aa0cae2801b5f

Added to database: 5/29/2025, 1:59:02 PM

Last enriched: 7/8/2025, 3:10:09 AM

Last updated: 7/29/2025, 12:10:35 PM

Views: 10

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats