Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%
Get alerts for future matching vulnerabilitiesLog in to subscribe
I. Basic Information for CVE-2022-35950
Vulnerability Information

Have questions about the vulnerability? See if Shenlong's analysis helps!
View Shenlong Deep Dive ↗

Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.

Vulnerability Title
OroCommerce Cross-site Scripting vulnerability in add note dialog of Shopping List line item
Source: NVD (National Vulnerability Database)
Vulnerability Description
OroCommerce is an open-source Business to Business Commerce application. In versions 4.1.0 through 4.1.13, 4.2.0 through 4.2.10, 5.0.0 prior to 5.0.11, and 5.1.0 prior to 5.1.1, the JS payload added to the product name may be executed at the storefront when adding a note to the shopping list line item containing a vulnerable product. An attacker should be able to edit a product in the admin area and force a user to add this product to Shopping List and click add a note for it. Versions 5.0.11 and 5.1.1 contain a fix for this issue.
Source: NVD (National Vulnerability Database)
CVSS Information
CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:H/I:L/A:N
Source: NVD (National Vulnerability Database)
Vulnerability Type
在Web页面生成时对输入的转义处理不恰当(跨站脚本)
Source: NVD (National Vulnerability Database)
Vulnerability Title
OroCommerce 跨站脚本漏洞
Source: CNNVD (China National Vulnerability Database)
Vulnerability Description
OroCommerce是Oro公司的一个开源的企业对企业商务应用程序。 OroCommerce 4.1.0至4.1.13、4.2.0至4.2.10、5.0.0至5.0.11、5.1.0至5.1.1版本存在跨站脚本漏洞,该漏洞源于当向包含易受攻击的产品的购物清单项目添加注释时,添加到产品名称的 JS 有效负载可能会被执行,攻击者利用该漏洞可以在管理区域中编辑一个产品,强制用户将此产品添加到购物清单并点击添加备注。
Source: CNNVD (China National Vulnerability Database)
CVSS Information
N/A
Source: CNNVD (China National Vulnerability Database)
Vulnerability Type
N/A
Source: CNNVD (China National Vulnerability Database)
Affected Products
VendorProductAffected VersionsCPESubscribe
oroincorocommerce >= 4.1.0, <= 4.1.13 -
II. Public POCs for CVE-2022-35950
#POC DescriptionSource LinkShenlong Link
AI-Generated POCPremium

No public POC found.

Login to generate AI POC
III. Intelligence Information for CVE-2022-35950
Please Login to view more intelligence information
IV. Related Vulnerabilities
V. Comments for CVE-2022-35950

No comments yet


Leave a comment