Vulnerability Monitor

The vendors, products, and vulnerabilities you care about

CVE-2022-26867


PowerStore SW v2.1.1.0 supports the option to export data to either a CSV or an XLSX file. The data is taken as is, without any validation or sanitization. It allows a malicious, authenticated user to inject payloads that might get interpreted as formulas by the corresponding spreadsheet application that is being used to open the CSV/XLSX file.


Published

2022-06-02T21:15:07.667

Last Modified

2024-11-21T06:54:42.620

Status

Modified

Source

[email protected]

Severity

CVSSv3.1: 5.9 (MEDIUM)

CVSSv2 Vector

AV:N/AC:M/Au:S/C:P/I:P/A:P

  • Access Vector: NETWORK
  • Access Complexity: MEDIUM
  • Authentication: SINGLE
  • Confidentiality Impact: PARTIAL
  • Integrity Impact: PARTIAL
  • Availability Impact: PARTIAL
Exploitability Score

6.8

Impact Score

6.4

Weaknesses
  • Type: Secondary
    CWE-1236
  • Type: Primary
    CWE-1236

Affected Vendors & Products
Type Vendor Product Version/Range Vulnerable?
Operating System dell powerstoreos < 2.1.1.0 Yes
Hardware dell powerstore_t - No
Hardware dell powerstore_x - No

References