CVE-2022-36180: n/a in n/a
Fusiondirectory 1.3 is vulnerable to Cross Site Scripting (XSS) via /fusiondirectory/index.php?message=[injection], /fusiondirectory/index.php?message=invalidparameter&plug={Injection], /fusiondirectory/index.php?signout=1&message=[injection]&plug=106.
AI Analysis
Technical Summary
CVE-2022-36180 is a critical Cross Site Scripting (XSS) vulnerability affecting FusionDirectory version 1.3. The vulnerability arises from improper sanitization of user-supplied input in the 'message' and 'plug' parameters within the /fusiondirectory/index.php endpoint. Specifically, the parameters /fusiondirectory/index.php?message=[injection], /fusiondirectory/index.php?message=invalidparameter&plug=[injection], and /fusiondirectory/index.php?signout=1&message=[injection]&plug=106 are susceptible to injection of malicious scripts. This vulnerability is classified under CWE-79, which pertains to improper neutralization of input during web page generation, allowing attackers to inject arbitrary JavaScript code. The CVSS v3.1 base score is 9.6, indicating a critical severity with the vector AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H. This means the attack can be performed remotely over the network with low attack complexity, requires no privileges but does require user interaction (such as clicking a crafted link). The scope is changed, indicating that the vulnerability affects components beyond the initially vulnerable component, and the impact on confidentiality, integrity, and availability is high. Although no known exploits are currently reported in the wild, the high CVSS score and the nature of XSS vulnerabilities make it a significant risk, especially in environments where FusionDirectory is used for managing directory services and identity management. Exploitation could lead to session hijacking, credential theft, or execution of malicious actions on behalf of authenticated users, potentially compromising the entire directory infrastructure.
Potential Impact
For European organizations, the impact of this vulnerability can be substantial, particularly for those relying on FusionDirectory for identity and access management. Successful exploitation could lead to unauthorized access to sensitive user credentials, manipulation of directory data, and lateral movement within corporate networks. This could result in data breaches involving personal data protected under GDPR, leading to regulatory penalties and reputational damage. The high integrity and availability impact means attackers could alter or disrupt directory services, affecting authentication and authorization processes critical to business operations. Additionally, since FusionDirectory is often used in public sector, educational institutions, and enterprises, exploitation could compromise critical infrastructure and services. The requirement for user interaction means phishing or social engineering campaigns could be used to trigger the vulnerability, increasing the risk of targeted attacks against high-value European organizations.
Mitigation Recommendations
To mitigate this vulnerability, organizations should prioritize upgrading FusionDirectory to a patched version once available. In the absence of an official patch, implement strict input validation and output encoding on all user-supplied parameters, especially 'message' and 'plug' in the index.php endpoint. Employ Content Security Policy (CSP) headers to restrict the execution of unauthorized scripts. Use web application firewalls (WAFs) with custom rules to detect and block suspicious payloads targeting these parameters. Conduct regular security assessments and penetration testing focused on XSS vectors. Educate users about phishing risks to reduce the likelihood of successful social engineering attacks. Additionally, monitor logs for unusual requests containing suspicious script payloads and implement multi-factor authentication (MFA) to limit the impact of credential theft. Network segmentation can also help contain potential lateral movement if exploitation occurs.
Affected Countries
France, Germany, United Kingdom, Netherlands, Belgium, Sweden, Italy
CVE-2022-36180: n/a in n/a
Description
Fusiondirectory 1.3 is vulnerable to Cross Site Scripting (XSS) via /fusiondirectory/index.php?message=[injection], /fusiondirectory/index.php?message=invalidparameter&plug={Injection], /fusiondirectory/index.php?signout=1&message=[injection]&plug=106.
AI-Powered Analysis
Technical Analysis
CVE-2022-36180 is a critical Cross Site Scripting (XSS) vulnerability affecting FusionDirectory version 1.3. The vulnerability arises from improper sanitization of user-supplied input in the 'message' and 'plug' parameters within the /fusiondirectory/index.php endpoint. Specifically, the parameters /fusiondirectory/index.php?message=[injection], /fusiondirectory/index.php?message=invalidparameter&plug=[injection], and /fusiondirectory/index.php?signout=1&message=[injection]&plug=106 are susceptible to injection of malicious scripts. This vulnerability is classified under CWE-79, which pertains to improper neutralization of input during web page generation, allowing attackers to inject arbitrary JavaScript code. The CVSS v3.1 base score is 9.6, indicating a critical severity with the vector AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H. This means the attack can be performed remotely over the network with low attack complexity, requires no privileges but does require user interaction (such as clicking a crafted link). The scope is changed, indicating that the vulnerability affects components beyond the initially vulnerable component, and the impact on confidentiality, integrity, and availability is high. Although no known exploits are currently reported in the wild, the high CVSS score and the nature of XSS vulnerabilities make it a significant risk, especially in environments where FusionDirectory is used for managing directory services and identity management. Exploitation could lead to session hijacking, credential theft, or execution of malicious actions on behalf of authenticated users, potentially compromising the entire directory infrastructure.
Potential Impact
For European organizations, the impact of this vulnerability can be substantial, particularly for those relying on FusionDirectory for identity and access management. Successful exploitation could lead to unauthorized access to sensitive user credentials, manipulation of directory data, and lateral movement within corporate networks. This could result in data breaches involving personal data protected under GDPR, leading to regulatory penalties and reputational damage. The high integrity and availability impact means attackers could alter or disrupt directory services, affecting authentication and authorization processes critical to business operations. Additionally, since FusionDirectory is often used in public sector, educational institutions, and enterprises, exploitation could compromise critical infrastructure and services. The requirement for user interaction means phishing or social engineering campaigns could be used to trigger the vulnerability, increasing the risk of targeted attacks against high-value European organizations.
Mitigation Recommendations
To mitigate this vulnerability, organizations should prioritize upgrading FusionDirectory to a patched version once available. In the absence of an official patch, implement strict input validation and output encoding on all user-supplied parameters, especially 'message' and 'plug' in the index.php endpoint. Employ Content Security Policy (CSP) headers to restrict the execution of unauthorized scripts. Use web application firewalls (WAFs) with custom rules to detect and block suspicious payloads targeting these parameters. Conduct regular security assessments and penetration testing focused on XSS vectors. Educate users about phishing risks to reduce the likelihood of successful social engineering attacks. Additionally, monitor logs for unusual requests containing suspicious script payloads and implement multi-factor authentication (MFA) to limit the impact of credential theft. Network segmentation can also help contain potential lateral movement if exploitation occurs.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- mitre
- Date Reserved
- 2022-07-18T00:00:00.000Z
- Cisa Enriched
- true
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 682d983cc4522896dcbeec07
Added to database: 5/21/2025, 9:09:16 AM
Last enriched: 6/22/2025, 11:51:30 AM
Last updated: 7/31/2025, 12:50:52 PM
Views: 13
Related Threats
CVE-2025-8834: Cross Site Scripting in JCG Link-net LW-N915R
MediumCVE-2025-55159: CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer in tokio-rs slab
MediumCVE-2025-55161: CWE-918: Server-Side Request Forgery (SSRF) in Stirling-Tools Stirling-PDF
HighCVE-2025-25235: CWE-918 Server-Side Request Forgery (SSRF) in Omnissa Secure Email Gateway
HighCVE-2025-55151: CWE-918: Server-Side Request Forgery (SSRF) in Stirling-Tools Stirling-PDF
HighActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.