Skip to main content

CVE-2022-43167: n/a in n/a

Medium
VulnerabilityCVE-2022-43167cvecve-2022-43167
Published: Fri Oct 28 2022 (10/28/2022, 00:00:00 UTC)
Source: CVE
Vendor/Project: n/a
Product: n/a

Description

A stored cross-site scripting (XSS) vulnerability in the Users Alerts feature (/index.php?module=users_alerts/users_alerts) of Rukovoditel v3.2.1 allows authenticated attackers to execute arbitrary web scripts or HTML via a crafted payload injected into the Title parameter after clicking "Add".

AI-Powered Analysis

AILast updated: 07/05/2025, 03:42:17 UTC

Technical Analysis

CVE-2022-43167 is a stored cross-site scripting (XSS) vulnerability identified in the Users Alerts feature of Rukovoditel version 3.2.1. Rukovoditel is a web-based project management and CRM tool. The vulnerability exists in the handling of the Title parameter within the /index.php?module=users_alerts/users_alerts endpoint. Authenticated attackers can inject malicious scripts or HTML payloads into the Title field when adding a new alert. Because this is a stored XSS, the injected payload is saved on the server and executed in the browsers of users who view the affected alert, potentially leading to session hijacking, credential theft, or further exploitation within the application context. The CVSS 3.1 base score is 5.4 (medium severity), with an attack vector of network (remote), low attack complexity, requiring privileges (authenticated user), and user interaction (victim must click to trigger the payload). The vulnerability impacts confidentiality and integrity but not availability. No public exploits are known at this time, and no official patches have been linked in the provided data. The CWE classification is CWE-79, which corresponds to improper neutralization of input leading to XSS. The vulnerability's scope is 'changed' (S:C), indicating that the vulnerability affects resources beyond the security scope of the vulnerable component, potentially impacting other users.

Potential Impact

For European organizations using Rukovoditel v3.2.1, this vulnerability poses a moderate risk. Since exploitation requires authenticated access, the threat is primarily from insiders or attackers who have compromised user credentials. Successful exploitation can lead to session hijacking or unauthorized actions performed on behalf of legitimate users, potentially exposing sensitive project management or CRM data. This could result in data leakage, reputational damage, and compliance issues under GDPR if personal data is involved. The stored nature of the XSS means multiple users can be affected once the malicious payload is injected, increasing the risk of lateral movement or privilege escalation within the application. However, the requirement for user interaction (clicking the alert) somewhat limits the attack surface. The absence of known public exploits reduces immediate risk but does not eliminate it, especially in targeted attacks. Organizations relying on Rukovoditel for critical workflows should consider this vulnerability seriously to prevent potential compromise.

Mitigation Recommendations

1. Immediate mitigation should include restricting access to the Users Alerts feature to only trusted and necessary users to reduce the risk of malicious input. 2. Implement input validation and output encoding on the Title parameter to neutralize any injected scripts or HTML. This includes sanitizing inputs on the server side and encoding outputs before rendering in the browser. 3. Apply the principle of least privilege to user roles to minimize the number of users who can add alerts. 4. Monitor logs for unusual alert creation activities or unexpected script injections. 5. If possible, upgrade to a patched version of Rukovoditel once available or apply vendor-provided patches. 6. Educate users to be cautious when clicking on alerts or links within the application, especially if unexpected. 7. Employ Content Security Policy (CSP) headers to reduce the impact of XSS by restricting the execution of unauthorized scripts. 8. Conduct regular security assessments and penetration tests focusing on web application input handling and authentication controls.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
mitre
Date Reserved
2022-10-17T00:00:00.000Z
Cisa Enriched
true
Cvss Version
3.1
State
PUBLISHED

Threat ID: 682d9818c4522896dcbd7f03

Added to database: 5/21/2025, 9:08:40 AM

Last enriched: 7/5/2025, 3:42:17 AM

Last updated: 7/31/2025, 10:21:29 PM

Views: 13

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats