Miggo Logo

CVE-2022-30349:
Cross site scripting in SSCMS

6.1

CVSS Score
3.1

Basic Information

EPSS Score
0.4388%
Published
6/3/2022
Updated
1/27/2023
KEV Status
No
Technology
TechnologyC#

Technical Details

CVSS Vector
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
Package NameEcosystemVulnerable VersionsFirst Patched Version
SSCMSnuget= 6.15.51

Vulnerability Intelligence
Miggo AIMiggo AI

Miggo AIRoot Cause Analysis

The vulnerability manifests in the modalRelatedFieldItemEdit.aspx endpoint where user-supplied input (TbItemName parameter) is directly reflected in the response without proper HTML encoding. The provided exploit demonstrates that submitting a crafted SVG payload in TbItemName parameter triggers XSS when rendered. This indicates the backend processing function (likely Page_Load() in ASP.NET Web Forms architecture) fails to sanitize user input before incorporating it into the page output. The combination of the vulnerable endpoint pattern and the demonstrated exploit mechanism strongly points to the field editor's form handling code as the vulnerable component.

Vulnerable functions

Only Mi**o us*rs **n s** t*is s**tion

WAF Protection Rules

WAF Rule

sit*s*rv*r SS*MS *.**.** is vuln*r**l* to *ross Sit* S*riptin* (XSS).

Reasoning

T** vuln*r**ility m*ni**sts in t** `mo**lR*l*t***i*l*It*m**it.*spx` *n*point w**r* us*r-suppli** input (`T*It*mN*m*` p*r*m*t*r) is *ir**tly r**l**t** in t** r*spons* wit*out prop*r *TML *n*o*in*. T** provi*** *xploit **monstr*t*s t**t su*mittin* * *r