Vulnerability Monitor

The vendors, products, and vulnerabilities you care about

CVE-2022-26111


The BeanShell components of IRISNext through 9.8.28 allow execution of arbitrary commands on the target server by creating a custom search (or editing an existing/predefined search) of the documents. The search components permit adding BeanShell expressions that result in Remote Code Execution in the context of the IRISNext application user, running on the web server.


Published

2022-04-25T15:15:49.733

Last Modified

2024-11-21T06:53:27.130

Status

Modified

Source

[email protected]

Severity

CVSSv3.1: 8.8 (HIGH)

CVSSv2 Vector

AV:N/AC:L/Au:S/C:C/I:C/A:C

  • Access Vector: NETWORK
  • Access Complexity: LOW
  • Authentication: SINGLE
  • Confidentiality Impact: COMPLETE
  • Integrity Impact: COMPLETE
  • Availability Impact: COMPLETE
Exploitability Score

8.0

Impact Score

10.0

Weaknesses
  • Type: Primary
    CWE-917

Affected Vendors & Products
Type Vendor Product Version/Range Vulnerable?
Application canon irisnext ≤ 9.8.28 Yes

References