This vulnerability allows remote attackers to bypass authentication on affected installations of Ivanti Avalanche 6.3.2.3490. The specific flaw exists within the ProfileDaoImpl class. A crafted request can trigger execution of SQL queries composed from a user-supplied string. An attacker can leverage this vulnerability to bypass authentication on the system. Was ZDI-CAN-15328.
References
Link | Resource |
---|---|
https://download.wavelink.com/Files/avalanche_v6.3.4_release_notes.txt | Release Notes |
https://www.zerodayinitiative.com/advisories/ZDI-22-777/ | Third Party Advisory VDB Entry |
https://download.wavelink.com/Files/avalanche_v6.3.4_release_notes.txt | Release Notes |
https://www.zerodayinitiative.com/advisories/ZDI-22-777/ | Third Party Advisory VDB Entry |
Configurations
History
21 Nov 2024, 07:14
Type | Values Removed | Values Added |
---|---|---|
References | () https://download.wavelink.com/Files/avalanche_v6.3.4_release_notes.txt - Release Notes | |
References | () https://www.zerodayinitiative.com/advisories/ZDI-22-777/ - Third Party Advisory, VDB Entry |
05 Apr 2023, 20:45
Type | Values Removed | Values Added |
---|---|---|
CPE | cpe:2.3:a:ivanti:avalanche:*:*:*:*:*:*:*:* | |
References | (MISC) https://www.zerodayinitiative.com/advisories/ZDI-22-777/ - Third Party Advisory, VDB Entry | |
References | (MISC) https://download.wavelink.com/Files/avalanche_v6.3.4_release_notes.txt - Release Notes | |
First Time |
Ivanti
Ivanti avalanche |
|
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 9.8 |
29 Mar 2023, 19:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2023-03-29 19:15
Updated : 2024-11-21 07:14
NVD link : CVE-2022-36972
Mitre link : CVE-2022-36972
CVE.ORG link : CVE-2022-36972
JSON object : View
Products Affected
ivanti
- avalanche
CWE
CWE-89
Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')