CVE-2022-23475

Source
https://nvd.nist.gov/vuln/detail/CVE-2022-23475
Import Source
https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2022-23475.json
JSON Data
https://api.osv.dev/v1/vulns/CVE-2022-23475
Aliases
  • GHSA-c9xx-6mvw-9v84
Published
2022-12-06T19:13:36Z
Modified
2025-11-04T19:45:56.272273Z
Severity
  • 8.8 (High) CVSS_V3 - CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H CVSS Calculator
Summary
dalorRadius full account take over
Details

daloRADIUS is an open source RADIUS web management application. daloRadius 1.3 and prior are vulnerable to a combination cross site scripting (XSS) and cross site request forgery (CSRF) vulnerability which leads to account takeover in the mng-del.php file because of an unescaped variable reflected in the DOM on line 116. This issue has been addressed in commit ec3b4a419e. Users are advised to manually apply the commit in order to mitigate this issue. Users may also mitigate this issue with in two parts 1) The CSRF vulnerability can be mitigated by making the daloRadius session cookie to samesite=Lax or by the implimentation of a CSRF token in all forms. 2) The XSS vulnerability may be mitigated by escaping it or by introducing a Content-Security policy.

Database specific
{
    "cwe_ids": [
        "CWE-352",
        "CWE-79"
    ]
}
References

Affected packages

Git / github.com/lirantal/daloradius

Affected ranges

Type
GIT
Repo
https://github.com/lirantal/daloradius
Events
Introduced
0 Unknown introduced commit / All previous commits are affected
Fixed

Affected versions

1.*

1.1-2
1.1-3
1.1-4
1.1-5
1.2
1.3