An issue was discovered in NetScout nGeniusONE 6.3.2 build 904. Open Redirection can occur (issue 1 of 2). After successful login, an attacker must visit the vulnerable parameter and inject a crafted payload to successfully redirect to an unknown host. The attack vector is Network, and the Attack Complexity required is High. Privileges required are administrator, User Interaction is required, and Scope is unchanged. The user must visit the vulnerable parameter and inject a crafted payload to successfully redirect to an unknown host.
References
Link | Resource |
---|---|
https://www.netscout.com/securityadvisories | Vendor Advisory |
Configurations
History
07 Feb 2023, 19:21
Type | Values Removed | Values Added |
---|---|---|
References | (MISC) https://www.netscout.com/securityadvisories - Vendor Advisory | |
CPE | cpe:2.3:a:netscout:ngeniusone:6.3.2:build904:*:*:*:*:*:* | |
CWE | CWE-601 | |
First Time |
Netscout
Netscout ngeniusone |
|
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 3.1 |
27 Jan 2023, 14:52
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2023-01-27 14:15
Updated : 2023-12-10 14:48
NVD link : CVE-2022-44717
Mitre link : CVE-2022-44717
CVE.ORG link : CVE-2022-44717
JSON object : View
Products Affected
netscout
- ngeniusone
CWE
CWE-601
URL Redirection to Untrusted Site ('Open Redirect')