A flaw was found in the REST API. An improperly handled REST API call could allow any logged user to elevate privileges up to the system account. This affects StarWind Command Center build 6003 v2.
References
Link | Resource |
---|---|
https://www.starwindsoftware.com/security/sw-20220121-0001/ | Vendor Advisory |
Configurations
History
01 Sep 2022, 13:15
Type | Values Removed | Values Added |
---|---|---|
Summary | A flaw was found in the REST API. An improperly handled REST API call could allow any logged user to elevate privileges up to the system account. This affects StarWind Command Center build 6003 v2. |
28 Jan 2022, 02:40
Type | Values Removed | Values Added |
---|---|---|
CWE | NVD-CWE-noinfo | |
CPE | cpe:2.3:a:starwindsoftware:command_center:2:build_6003:*:*:*:*:*:* | |
CVSS |
v2 : v3 : |
v2 : 9.0
v3 : 8.8 |
First Time |
Starwindsoftware command Center
Starwindsoftware |
|
References | (MISC) https://www.starwindsoftware.com/security/sw-20220121-0001/ - Vendor Advisory |
24 Jan 2022, 03:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2022-01-24 03:15
Updated : 2023-12-10 14:09
NVD link : CVE-2022-23858
Mitre link : CVE-2022-23858
CVE.ORG link : CVE-2022-23858
JSON object : View
Products Affected
starwindsoftware
- command_center
CWE