CVE-2022-23858

A flaw was found in the REST API. An improperly handled REST API call could allow any logged user to elevate privileges up to the system account. This affects StarWind Command Center build 6003 v2.
References
Configurations

Configuration 1 (hide)

cpe:2.3:a:starwindsoftware:command_center:2:build_6003:*:*:*:*:*:*

History

01 Sep 2022, 13:15

Type Values Removed Values Added
Summary In StarWind Command Center before V2 build 6021, an authenticated read-only user can elevate privileges to administrator through the REST API. A flaw was found in the REST API. An improperly handled REST API call could allow any logged user to elevate privileges up to the system account. This affects StarWind Command Center build 6003 v2.

28 Jan 2022, 02:40

Type Values Removed Values Added
CWE NVD-CWE-noinfo
CPE cpe:2.3:a:starwindsoftware:command_center:2:build_6003:*:*:*:*:*:*
CVSS v2 : unknown
v3 : unknown
v2 : 9.0
v3 : 8.8
First Time Starwindsoftware command Center
Starwindsoftware
References (MISC) https://www.starwindsoftware.com/security/sw-20220121-0001/ - (MISC) https://www.starwindsoftware.com/security/sw-20220121-0001/ - Vendor Advisory

24 Jan 2022, 03:15

Type Values Removed Values Added
New CVE

Information

Published : 2022-01-24 03:15

Updated : 2023-12-10 14:09


NVD link : CVE-2022-23858

Mitre link : CVE-2022-23858

CVE.ORG link : CVE-2022-23858


JSON object : View

Products Affected

starwindsoftware

  • command_center