An issue was discovered in Smart Office Web 20.28 and earlier allows attackers to download sensitive information via the action name parameter to ExportEmployeeDetails.aspx, and to ExportReportingManager.aspx.
References
Configurations
History
21 Nov 2024, 07:31
Type | Values Removed | Values Added |
---|---|---|
References | () http://packetstormsecurity.com/files/173093/Smart-Office-Web-20.28-Information-Disclosure-Insecure-Direct-Object-Reference.html - | |
References | () https://cvewalkthrough.com/smart-office-suite-cve-2022-47076-cve-2022-47075/ - Exploit, Third Party Advisory | |
References | () https://cvewalkthrough.com/smart-office-suite-unauthenticated-data-ex/ - Broken Link | |
References | () https://youtu.be/D42upepxzwM - Permissions Required |
23 Jun 2023, 17:15
Type | Values Removed | Values Added |
---|---|---|
References |
|
Information
Published : 2023-02-28 23:15
Updated : 2025-03-18 15:15
NVD link : CVE-2022-47075
Mitre link : CVE-2022-47075
CVE.ORG link : CVE-2022-47075
JSON object : View
Products Affected
smartofficepayroll
- smartoffice
CWE