CVE-2022-36783

AlgoSec – FireFlow Reflected Cross-Site-Scripting (RXSS)

Description

AlgoSec – FireFlow Reflected Cross-Site-Scripting (RXSS) A malicious user injects JavaScript code into a parameter called IntersectudRule on the search/result.html page. The malicious user changes the request from POST to GET and sends the URL to another user (victim). JavaScript code is executed on the browser of the other user.

Remediation

Solution:

  • Update released for the following versions: For A32.0 : A32.0.580-277 For A32.10 : A32.10.410-212 For A32.20 : A32.20.230-35

Category

6.5
CVSS
Severity: Medium
CVSS 3.1 •
EPSS 0.06%
Third-Party Advisory gov.il
Affected: AlgoSec FireFlow A32.0
Affected: AlgoSec FireFlow A32.10
Affected: AlgoSec FireFlow A32.20
Published at:
Updated at:

References

Frequently Asked Questions

What is the severity of CVE-2022-36783?
CVE-2022-36783 has been scored as a medium severity vulnerability.
How to fix CVE-2022-36783?
To fix CVE-2022-36783: Update released for the following versions: For A32.0 : A32.0.580-277 For A32.10 : A32.10.410-212 For A32.20 : A32.20.230-35
Is CVE-2022-36783 being actively exploited in the wild?
As for now, there are no information to confirm that CVE-2022-36783 is being actively exploited. According to its EPSS score, there is a ~0% probability that this vulnerability will be exploited by malicious actors in the next 30 days.
What software or system is affected by CVE-2022-36783?
CVE-2022-36783 affects AlgoSec FireFlow A32.0, AlgoSec FireFlow A32.10, AlgoSec FireFlow A32.20.
This platform uses data from the NIST NVD, MITRE CVE, MITRE CWE, First.org and CISA KEV but is not endorsed or certified by these entities. CVE is a registred trademark of the MITRE Corporation and the authoritative source of CVE content is MITRE's CVE web site. CWE is a registred trademark of the MITRE Corporation and the authoritative source of CWE content is MITRE's CWE web site.
© 2025 Under My Watch. All Rights Reserved.