CVE-2022-29942
Published May 4, 2022
Last updated 3 years ago
Overview
- Description
- Talend Administration Center has a vulnerability that allows an authenticated user to use the Service Registry 'Add' functionality to perform SSRF HTTP GET requests on URLs in the internal network. The issue is fixed for versions 8.0.x in TPS-5189, versions 7.3.x in TPS-5175, and versions 7.2.x in TPS-5201. Earlier versions of Talend Administration Center may also be impacted; users are encouraged to update to a supported version.
- Source
- cve@mitre.org
- NVD status
- Analyzed
Risk scores
CVSS 3.1
- Type
- Primary
- Base score
- 6.5
- Impact score
- 3.6
- Exploitability score
- 2.8
- Vector string
- CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
- Severity
- MEDIUM
CVSS 2.0
- Type
- Primary
- Base score
- 4
- Impact score
- 2.9
- Exploitability score
- 8
- Vector string
- AV:N/AC:L/Au:S/C:P/I:N/A:N
Weaknesses
- nvd@nist.gov
- CWE-918
Social media
- Hype score
- Not currently trending
Configurations
[ { "nodes": [ { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:a:talend:administration_center:7.2.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "9C41B793-589A-4E05-8DD0-5B124B9BC2E2" }, { "criteria": "cpe:2.3:a:talend:administration_center:7.3.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "E86982F7-8EFB-4639-A295-41F1010EDDEE" }, { "criteria": "cpe:2.3:a:talend:administration_center:8.0.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "546FEC80-19A7-4E82-AF20-B096C184DCF1" } ], "operator": "OR" } ] } ]