Skip to main content

CVE-2022-42746: Reflected cross-site scripting (XSS) in CandidATS

Medium
VulnerabilityCVE-2022-42746cvecve-2022-42746
Published: Thu Nov 03 2022 (11/03/2022, 00:00:00 UTC)
Source: CVE
Vendor/Project: n/a
Product: CandidATS

Description

CandidATS version 3.0.0 on 'indexFile' of the 'ajax.php' resource, allows an external attacker to steal the cookie of arbitrary users. This is possible because the application application does not properly validate user input against XSS attacks.

AI-Powered Analysis

AILast updated: 07/07/2025, 01:55:53 UTC

Technical Analysis

CVE-2022-42746 is a reflected cross-site scripting (XSS) vulnerability identified in CandidATS version 3.0.0, specifically affecting the 'indexFile' parameter of the 'ajax.php' resource. Reflected XSS occurs when an application includes untrusted user input in a web page without proper validation or encoding, allowing attackers to inject malicious scripts that execute in the context of the victim's browser. In this case, the vulnerability enables an external attacker to craft a malicious URL or request that, when visited by an unsuspecting user, causes the victim's browser to execute attacker-controlled JavaScript. This script can steal sensitive information such as cookies, which may contain session tokens or other authentication credentials. The vulnerability arises due to insufficient input validation and output encoding in the affected parameter, which fails to neutralize potentially dangerous characters or scripts. The CVSS v3.1 base score is 6.1, indicating a medium severity level. The vector string (AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N) shows that the attack can be launched remotely over the network with low attack complexity, requires no privileges but does require user interaction (the victim must click a malicious link). The scope is changed (S:C), meaning the vulnerability affects resources beyond the initially vulnerable component, and it impacts confidentiality and integrity to a limited extent (C:L/I:L) but does not affect availability. No known exploits are reported in the wild, and no patches have been linked yet. The vulnerability is classified under CWE-79, which is the standard identifier for cross-site scripting issues.

Potential Impact

For European organizations using CandidATS version 3.0.0, this vulnerability poses a risk of session hijacking and unauthorized access through stolen cookies. Attackers can leverage this to impersonate legitimate users, potentially gaining access to sensitive data or internal systems managed via CandidATS. This can lead to data breaches, unauthorized actions, and erosion of trust in affected services. The reflected XSS nature means attacks require user interaction, typically through phishing or social engineering, which can be facilitated by targeted campaigns. Given that CandidATS is a specialized application, the impact is concentrated on organizations that deploy this software, which may include recruitment agencies or HR departments in Europe. The confidentiality and integrity of user sessions are at risk, which can have regulatory implications under GDPR if personal data is compromised. Additionally, the changed scope indicates that the vulnerability could affect other components or services linked to the application, potentially broadening the impact within an organization's IT environment.

Mitigation Recommendations

Since no official patches are currently linked, organizations should implement immediate compensating controls. These include: 1) Applying strict input validation and output encoding on the 'indexFile' parameter in 'ajax.php' to neutralize malicious scripts. If source code access is available, developers should sanitize user inputs using secure coding libraries or frameworks that automatically handle XSS prevention. 2) Employ Content Security Policy (CSP) headers to restrict the execution of unauthorized scripts in browsers, limiting the impact of any injected code. 3) Educate users about phishing risks and suspicious links to reduce the likelihood of successful exploitation via social engineering. 4) Monitor web application logs for unusual or suspicious requests targeting 'ajax.php' with potentially malicious payloads. 5) If feasible, restrict access to the vulnerable resource to trusted networks or authenticated users until a patch is available. 6) Regularly check for vendor updates or community patches addressing this vulnerability and apply them promptly once released. 7) Consider deploying Web Application Firewalls (WAFs) with rules designed to detect and block reflected XSS attempts targeting known vulnerable parameters.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
Fluid Attacks
Date Reserved
2022-10-10T00:00:00.000Z
Cisa Enriched
true
Cvss Version
3.1
State
PUBLISHED

Threat ID: 682d981fc4522896dcbdcb9f

Added to database: 5/21/2025, 9:08:47 AM

Last enriched: 7/7/2025, 1:55:53 AM

Last updated: 8/11/2025, 9:42:03 AM

Views: 17

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats