{"vulnerability": "CVE-2022-30280", "sightings": [{"uuid": "4eeb0d16-8460-4dfc-967a-9519b0dc1b04", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2022-30280", "type": "seen", "source": "https://t.me/kasraone_com/478", "content": "\ud83d\udd34 CVE \n\n\n\ud83d\udd34 CVE-2022-30280\n\n\n\u0627\u0645\u06a9\u0627\u0646 \u0627\u062c\u0631\u0627\u06cc \u062d\u0645\u0644\u0627\u062a CSRF \u062f\u0631 \u0635\u0641\u062d\u0647 \n\n/SecurityManagement/html/createuser.jsf \u062f\u0631 \u0646\u0631\u0645\u200c\u0627\u0641\u0632\u0627\u0631 Nokia NetAct 22 \u0648\u062c\u0648\u062f \u062f\u0627\u0631\u062f. \u06cc\u06a9 \u062d\u0645\u0644\u0647\u200c\u06a9\u0646\u0646\u062f\u0647 \u0627\u0632 \u0631\u0627\u0647 \u062f\u0648\u0631 \u0642\u0627\u062f\u0631 \u0627\u0633\u062a \u06a9\u0627\u0631\u0628\u0631\u0627\u0646\u06cc \u0628\u0627 \u0627\u0645\u062a\u06cc\u0627\u0632\u0627\u062a \u062f\u0644\u062e\u0648\u0627\u0647\u060c \u062d\u062a\u06cc \u0627\u0645\u062a\u06cc\u0627\u0632\u0627\u062a \u0645\u062f\u06cc\u0631\u06cc\u062a\u06cc\u060c \u0628\u0633\u0627\u0632\u062f. \u0627\u06cc\u0646 \u0628\u0631\u0646\u0627\u0645\u0647 (\u062d\u062a\u06cc \u0627\u06af\u0631 \u06cc\u06a9 \u062a\u0648\u06a9\u0646 CSRF \u0631\u0627 \u0628\u0631\u0627\u06cc \u062f\u0631\u062e\u0648\u0627\u0633\u062a GET \u062a\u0635\u0627\u062f\u0641\u06cc \u067e\u06cc\u0627\u062f\u0647\u200c\u0633\u0627\u0632\u06cc \u06a9\u0646\u062f) \u0647\u0631\u06af\u0632 \u062a\u0648\u06a9\u0646 CSRF \u0631\u0627 \u062a\u0623\u06cc\u06cc\u062f \u0646\u0645\u06cc\u200c\u06a9\u0646\u062f. \u0628\u0627 \u06a9\u0645\u06a9 \u0645\u0647\u0627\u0631\u062a\u200c\u0647\u0627\u06cc \u0645\u0647\u0646\u062f\u0633\u06cc \u0627\u062c\u062a\u0645\u0627\u0639\u06cc/\u0641\u0634\u06cc\u0646\u06af (\u0645\u0627\u0646\u0646\u062f \u0627\u0631\u0633\u0627\u0644 \u0644\u06cc\u0646\u06a9 \u0627\u0632 \u0637\u0631\u06cc\u0642 \u0627\u06cc\u0645\u06cc\u0644 \u06cc\u0627 \u0686\u062a)\u060c \u06cc\u06a9 \u062d\u0645\u0644\u0647\u200c\u06a9\u0646\u0646\u062f\u0647 \u0645\u0645\u06a9\u0646 \u0627\u0633\u062a \u06a9\u0627\u0631\u0628\u0631\u0627\u0646 \u06cc\u06a9 \u0628\u0631\u0646\u0627\u0645\u0647 \u0648\u0628 \u0631\u0627 \u0628\u0647 \u0627\u062c\u0631\u0627\u06cc \u0639\u0645\u0644\u200c\u0647\u0627\u06cc \u062f\u0644\u062e\u0648\u0627\u0647 \u062e\u0648\u062f \u062a\u0634\u0648\u06cc\u0642 \u06a9\u0646\u062f. \u062f\u0631 \u0635\u0648\u0631\u062a \u0622\u0633\u064a\u0628 \u067e\u0630\u064a\u0631\u064a \u064a\u0643 \u0643\u0627\u0631\u0628\u0631 \u0639\u0627\u062f\u064a\u060c \u064a\u0643 \u062d\u0645\u0644\u0647 CSRF \u0645\u0648\u0641\u0642 \u0645\u064a \u062a\u0648\u0627\u0646\u062f \u0643\u0627\u0631\u0628\u0631 \u0631\u0627 \u0645\u062c\u0628\u0648\u0631 \u0628\u0647 \u0627\u062c\u0631\u0627\u06cc \u062f\u0631\u062e\u0648\u0627\u0633\u062a\u200c\u0647\u0627\u06cc \u062a\u063a\u064a\u064a\u0631 \u0648\u0636\u0639\u064a\u062a \u0645\u0627\u0646\u0646\u062f \u0627\u0646\u062a\u0642\u0627\u0644 \u0648\u062c\u0648\u0647\u060c \u062a\u063a\u064a\u064a\u0631 \u0622\u062f\u0631\u0633 \u0627\u064a\u0645\u064a\u0644 \u0648 \u063a\u064a\u0631\u0647 \u0643\u0646\u062f. \u062f\u0631 \u0635\u0648\u0631\u062a\u06cc \u06a9\u0647 \u0642\u0631\u0628\u0627\u0646\u06cc \u06cc\u06a9 \u062d\u0633\u0627\u0628 \u0645\u062f\u06cc\u0631\u06cc\u062a\u06cc \u0628\u0627\u0634\u062f\u060c CSRF \u0645\u06cc\u200c\u062a\u0648\u0627\u0646\u062f \u0628\u0647 \u06a9\u0644 \u0628\u0631\u0646\u0627\u0645\u0647 \u0648\u0628 \u0622\u0633\u06cc\u0628 \u0628\u0631\u0633\u0627\u0646\u062f.", "creation_timestamp": "2023-08-24T20:02:30.000000Z"}, {"uuid": "0a528a90-f0ba-443c-bcbb-335d35637106", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2022-30280", "type": "seen", "source": "https://t.me/cibsecurity/67152", "content": "\u203c CVE-2022-30280 \u203c\n\n/SecurityManagement/html/createuser.jsf in Nokia NetAct 22 allows CSRF. A remote attacker is able to create users with arbitrary privileges, even administrative privileges. The application (even if it implements a CSRF token for the random GET request) does not ever verify a CSRF token. With a little help of social engineering/phishing (such as sending a link via email or chat), an attacker may trick the users of a web application into executing actions of the attacker's choosing. If the victim is a normal user, a successful CSRF attack can force the user to perform state changing requests like transferring funds, changing their email address, and so forth. If the victim is an administrative account, CSRF can compromise the entire web application.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2023-07-24T18:26:10.000000Z"}]}