This vulnerability allows remote attackers to bypass authentication on affected installations of Ivanti Avalanche 6.3.2.3490. The specific flaw exists within the ProfileDaoImpl class. A crafted request can trigger execution of SQL queries composed from a user-supplied string. An attacker can leverage this vulnerability to bypass authentication on the system. Was ZDI-CAN-15328.
References
| Link | Resource |
|---|---|
| https://www.zerodayinitiative.com/advisories/ZDI-22-777/ | Third Party Advisory VDB Entry |
| https://download.wavelink.com/Files/avalanche_v6.3.4_release_notes.txt | Release Notes |
Configurations
History
05 Apr 2023, 20:45
| Type | Values Removed | Values Added |
|---|---|---|
| First Time |
Ivanti
Ivanti avalanche |
|
| CVSS |
v2 : v3 : |
v2 : unknown
v3 : 9.8 |
| References | (MISC) https://download.wavelink.com/Files/avalanche_v6.3.4_release_notes.txt - Release Notes | |
| References | (MISC) https://www.zerodayinitiative.com/advisories/ZDI-22-777/ - Third Party Advisory, VDB Entry | |
| CPE | cpe:2.3:a:ivanti:avalanche:*:*:*:*:*:*:*:* |
Information
Published : 2023-03-29 19:15
Updated : 2023-04-05 20:45
NVD link : CVE-2022-36972
Mitre link : CVE-2022-36972
JSON object : View
Products Affected
ivanti
- avalanche
CWE
CWE-89
Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')
