Learn about CVE-2022-35950 impacting OroCommerce versions 4.1.0 to 4.1.13, 4.2.0 to 4.2.10, 5.0.0 to 5.0.11, and 5.1.0 to 5.1.1. Understand the risks and mitigation steps for this XSS vulnerability.
A Cross-site Scripting vulnerability has been identified in the add note dialog of the Shopping List line item in OroCommerce, affecting multiple versions of the software.
Understanding CVE-2022-35950
This CVE impacts OroCommerce versions 4.1.0 to 4.1.13, 4.2.0 to 4.2.10, 5.0.0 to 5.0.11, and 5.1.0 to 5.1.1, allowing for malicious JavaScript payload execution on the storefront.
What is CVE-2022-35950?
OroCommerce, an open-source B2B Commerce application, allows the execution of JS payload added to the product name when a note is added to the shopping list line item. Attackers can manipulate admin area products to exploit users via Shopping List interactions.
The Impact of CVE-2022-35950
The vulnerability poses a high confidentiality impact and low integrity impact. Successful exploitation can lead to unauthorized JS execution, potentially compromising user data.
Technical Details of CVE-2022-35950
The vulnerability stems from improper neutralization of input during web page generation, categorized under CWE-79.
Vulnerability Description
The issue arises when a malicious JavaScript payload in the product name triggers execution upon adding a note to a vulnerable shopping list line item.
Affected Systems and Versions
OroCommerce versions 4.1.0 to 4.1.13, 4.2.0 to 4.2.10, 5.0.0 to 5.0.11, and 5.1.0 to 5.1.1 are impacted by this CVE, with specific version ranges vulnerable to the exploit.
Exploitation Mechanism
Attackers leverage the vulnerability by manipulating product names in the admin area to trigger malicious JS execution when a user interacts with the Shopping List feature.
Mitigation and Prevention
Immediate actions are crucial to mitigate the risks associated with CVE-2022-35950 and ensure the security of OroCommerce installations.
Immediate Steps to Take
Long-Term Security Practices
Patching and Updates
Apply security patches provided by OroCommerce promptly to ensure protection against known vulnerabilities.