{"containers":{"cna":{"affected":[{"product":"ITarian platform (SAAS / on-premise)","vendor":"ITarian","versions":[{"lessThan":"6.35.37347.20040","status":"affected","version":"any version","versionType":"custom"}]}],"credits":[{"lang":"en","value":"Wietse Boonstra (DIVD)","user":"00000000-0000-4000-9000-000000000000","type":"finder"},{"lang":"en","value":"Hidde Smit (DIVD)","type":"finder"},{"lang":"en","value":"Frank Breedijk (DIVD)","type":"analyst"},{"lang":"en","value":"Victor Pasman (DIVD)","type":"analyst"},{"lang":"en","value":"Vicotr Gevers (DIVD)","type":"analyst"}],"datePublic":"2022-02-23T00:00:00.000Z","descriptions":[{"lang":"en","value":"The ITarian platform (SAAS / on-premise) offers the possibility to run code on agents via a function called procedures. It is possible to require a mandatory approval process. Due to a vulnerability in the approval process, present in any version prior to 6.35.37347.20040, a malicious actor (with a valid session token) can create a procedure, bypass approval, and execute the procedure. This results in the ability for any user with a valid session token to perform arbitrary code execution and full system take-over on all agents."}],"metrics":[{"cvssV3_1":{"attackComplexity":"LOW","attackVector":"NETWORK","availabilityImpact":"HIGH","baseScore":9.9,"baseSeverity":"CRITICAL","confidentialityImpact":"HIGH","integrityImpact":"HIGH","privilegesRequired":"LOW","scope":"CHANGED","userInteraction":"NONE","vectorString":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H","version":"3.1"}}],"problemTypes":[{"descriptions":[{"cweId":"CWE-358","description":"CWE-358 Improperly Implemented Security Check for Standard","lang":"en","type":"CWE"}]}],"providerMetadata":{"orgId":"b87402ff-ae37-4194-9dae-31abdbd6f217","shortName":"DIVD","dateUpdated":"2025-03-11T13:40:38.630Z"},"references":[{"tags":["x_refsource_CONFIRM","related"],"url":"https://csirt.divd.nl/DIVD-2021-00037"},{"tags":["x_refsource_CONFIRM","third-party-advisory"],"url":"https://csirt.divd.nl/CVE-2022-25152"}],"source":{"advisory":"DIVD-2021-00037","discovery":"INTERNAL"},"title":"ITarian - Any user with a valid session token can create and execute agent procedures and bypass mandatory approvals","x_generator":{"engine":"Vulnogram 0.0.9"}},"adp":[{"title":"CISA ADP Vulnrichment","metrics":[{"other":{"type":"ssvc","content":{"id":"CVE-2022-25152","role":"CISA Coordinator","options":[{"Exploitation":"none"},{"Automatable":"yes"},{"Technical Impact":"total"}],"version":"2.0.3","timestamp":"2024-05-23T16:47:46.842293Z"}}}],"providerMetadata":{"orgId":"134c704f-9b21-4f2e-91b3-4a467353bcc0","shortName":"CISA-ADP","dateUpdated":"2024-06-04T17:15:34.854Z"}},{"providerMetadata":{"orgId":"af854a3a-2127-422b-91ae-364da2661108","shortName":"CVE","dateUpdated":"2024-08-03T04:29:01.861Z"},"title":"CVE Program Container","references":[{"tags":["x_refsource_CONFIRM","related","x_transferred"],"url":"https://csirt.divd.nl/DIVD-2021-00037"},{"tags":["x_refsource_CONFIRM","third-party-advisory","x_transferred"],"url":"https://csirt.divd.nl/CVE-2022-25152"}]}]},"cveMetadata":{"assignerOrgId":"b87402ff-ae37-4194-9dae-31abdbd6f217","assignerShortName":"DIVD","cveId":"CVE-2022-25152","datePublished":"2022-06-08T00:00:00.000Z","dateReserved":"2022-02-14T00:00:00.000Z","dateUpdated":"2025-03-11T13:40:38.630Z","state":"PUBLISHED"},"dataType":"CVE_RECORD","dataVersion":"5.1"}