CVE-2022-40305
Published on: Not Yet Published
Last Modified on: 09/10/2022 03:53:00 AM UTC
Certain versions of Canto from Canto contain the following vulnerability:
A Server-Side Request Forgery issue in Canto Cumulus through 11.1.3 allows attackers to enumerate the internal network, overload network resources, and possibly have unspecified other impact via the server parameter to the /cwc/login login form.
- CVE-2022-40305 has been assigned by
[email protected] to track the vulnerability - currently rated as CRITICAL severity.
CVSS3 Score: 9.8 - CRITICAL
Attack Vector ⓘ |
Attack Complexity |
Privileges Required |
User Interaction |
---|---|---|---|
NETWORK | LOW | NONE | NONE |
Scope | Confidentiality Impact |
Integrity Impact |
Availability Impact |
UNCHANGED | HIGH | HIGH | HIGH |
CVE References
Description | Tags ⓘ | Link |
---|---|---|
www.syss.de text/plain |
![]() |
There are currently no QIDs associated with this CVE
Known Affected Configurations (CPE V2.3)
Type | Vendor | Product | Version | Update | Edition | Language |
---|---|---|---|---|---|---|
Application | Canto | Canto | All | All | All | All |
- cpe:2.3:a:canto:canto:*:*:*:*:*:*:*:*:
No vendor comments have been submitted for this CVE
Social Mentions
Source | Title | Posted (UTC) |
---|---|---|
![]() |
CVE-2022-40305 : A Server-Side Request Forgery issue in Canto Cumulus through 11.1.3 allows attackers to enumerate… twitter.com/i/web/status/1… | 2022-09-09 05:04:59 |
![]() |
Potentially Critical CVE Detected! CVE-2022-40305 A Server-Side Request Forgery issue in Canto Cumulus through 11.1… twitter.com/i/web/status/1… | 2022-09-09 06:56:00 |
![]() |
CVE-2022-40305 | 2022-09-09 06:38:33 |