Skip to main content

CVE-2022-36180: n/a in n/a

Critical
VulnerabilityCVE-2022-36180cvecve-2022-36180
Published: Tue Nov 22 2022 (11/22/2022, 00:00:00 UTC)
Source: CVE
Vendor/Project: n/a
Product: n/a

Description

Fusiondirectory 1.3 is vulnerable to Cross Site Scripting (XSS) via /fusiondirectory/index.php?message=[injection], /fusiondirectory/index.php?message=invalidparameter&plug={Injection], /fusiondirectory/index.php?signout=1&message=[injection]&plug=106.

AI-Powered Analysis

AILast updated: 06/22/2025, 11:51:30 UTC

Technical Analysis

CVE-2022-36180 is a critical Cross Site Scripting (XSS) vulnerability affecting FusionDirectory version 1.3. The vulnerability arises from improper sanitization of user-supplied input in the 'message' and 'plug' parameters within the /fusiondirectory/index.php endpoint. Specifically, the parameters /fusiondirectory/index.php?message=[injection], /fusiondirectory/index.php?message=invalidparameter&plug=[injection], and /fusiondirectory/index.php?signout=1&message=[injection]&plug=106 are susceptible to injection of malicious scripts. This vulnerability is classified under CWE-79, which pertains to improper neutralization of input during web page generation, allowing attackers to inject arbitrary JavaScript code. The CVSS v3.1 base score is 9.6, indicating a critical severity with the vector AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H. This means the attack can be performed remotely over the network with low attack complexity, requires no privileges but does require user interaction (such as clicking a crafted link). The scope is changed, indicating that the vulnerability affects components beyond the initially vulnerable component, and the impact on confidentiality, integrity, and availability is high. Although no known exploits are currently reported in the wild, the high CVSS score and the nature of XSS vulnerabilities make it a significant risk, especially in environments where FusionDirectory is used for managing directory services and identity management. Exploitation could lead to session hijacking, credential theft, or execution of malicious actions on behalf of authenticated users, potentially compromising the entire directory infrastructure.

Potential Impact

For European organizations, the impact of this vulnerability can be substantial, particularly for those relying on FusionDirectory for identity and access management. Successful exploitation could lead to unauthorized access to sensitive user credentials, manipulation of directory data, and lateral movement within corporate networks. This could result in data breaches involving personal data protected under GDPR, leading to regulatory penalties and reputational damage. The high integrity and availability impact means attackers could alter or disrupt directory services, affecting authentication and authorization processes critical to business operations. Additionally, since FusionDirectory is often used in public sector, educational institutions, and enterprises, exploitation could compromise critical infrastructure and services. The requirement for user interaction means phishing or social engineering campaigns could be used to trigger the vulnerability, increasing the risk of targeted attacks against high-value European organizations.

Mitigation Recommendations

To mitigate this vulnerability, organizations should prioritize upgrading FusionDirectory to a patched version once available. In the absence of an official patch, implement strict input validation and output encoding on all user-supplied parameters, especially 'message' and 'plug' in the index.php endpoint. Employ Content Security Policy (CSP) headers to restrict the execution of unauthorized scripts. Use web application firewalls (WAFs) with custom rules to detect and block suspicious payloads targeting these parameters. Conduct regular security assessments and penetration testing focused on XSS vectors. Educate users about phishing risks to reduce the likelihood of successful social engineering attacks. Additionally, monitor logs for unusual requests containing suspicious script payloads and implement multi-factor authentication (MFA) to limit the impact of credential theft. Network segmentation can also help contain potential lateral movement if exploitation occurs.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
mitre
Date Reserved
2022-07-18T00:00:00.000Z
Cisa Enriched
true
Cvss Version
3.1
State
PUBLISHED

Threat ID: 682d983cc4522896dcbeec07

Added to database: 5/21/2025, 9:09:16 AM

Last enriched: 6/22/2025, 11:51:30 AM

Last updated: 7/31/2025, 12:50:52 PM

Views: 13

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats