Vulnerabilities > CVE-2022-26111 - Expression Language Injection vulnerability in Canon Irisnext 9.8.28
Attack vector
NETWORK Attack complexity
LOW Privileges required
LOW Confidentiality impact
HIGH Integrity impact
HIGH Availability impact
HIGH Summary
The BeanShell components of IRISNext through 9.8.28 allow execution of arbitrary commands on the target server by creating a custom search (or editing an existing/predefined search) of the documents. The search components permit adding BeanShell expressions that result in Remote Code Execution in the context of the IRISNext application user, running on the web server.
Vulnerable Configurations
Part | Description | Count |
---|---|---|
Application | 2 |