Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2022-29895 | The ITarian platform (SAAS / on-premise) offers the possibility to run code on agents via a function called procedures. It is possible to require a mandatory approval process. Due to a vulnerability in the approval process, present in any version prior to 6.35.37347.20040, a malicious actor (with a valid session token) can create a procedure, bypass approval, and execute the procedure. This results in the ability for any user with a valid session token to perform arbitrary code execution and full system take-over on all agents. |
Wed, 18 Sep 2024 08:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Status: PUBLISHED
Assigner: DIVD
Published:
Updated: 2025-03-11T13:40:38.630Z
Reserved: 2022-02-14T00:00:00.000Z
Link: CVE-2022-25152
Updated: 2024-08-03T04:29:01.861Z
Status : Modified
Published: 2022-06-09T17:15:08.847
Modified: 2024-11-21T06:51:42.203
Link: CVE-2022-25152
No data.
OpenCVE Enrichment
No data.
EUVD