{"containers":{"cna":{"affected":[{"product":"PingFederate","vendor":"Ping Identity","versions":[{"lessThanOrEqual":"11.0","status":"affected","version":"11.0","versionType":"custom"},{"lessThanOrEqual":"10.3.4","status":"affected","version":"10.3","versionType":"custom"},{"lessThanOrEqual":"10.2.7","status":"affected","version":"10.2","versionType":"custom"},{"lessThanOrEqual":"10.1.9","status":"affected","version":"10.1","versionType":"custom"},{"lessThanOrEqual":"10.0.12","status":"affected","version":"10.0","versionType":"custom"},{"lessThanOrEqual":"9.3.3P16","status":"affected","version":"9.3","versionType":"custom"}]}],"descriptions":[{"lang":"en","value":"When a password reset mechanism is configured to use the Authentication API with an Authentication Policy, email One-Time Password, PingID or SMS authentication, an existing user can reset another existing user’s password."}],"problemTypes":[{"descriptions":[{"cweId":"CWE-288","description":"CWE-288 Authentication Bypass Using an Alternate Path or Channel","lang":"en","type":"CWE"}]}],"providerMetadata":{"dateUpdated":"2022-05-02T22:05:13.000Z","orgId":"5998a2e9-ae88-42cd-b6e0-7564fd979f9e","shortName":"Ping Identity"},"references":[{"tags":["x_refsource_MISC"],"url":"https://www.pingidentity.com/en/resources/downloads/pingfederate.html"},{"tags":["x_refsource_MISC"],"url":"https://docs.pingidentity.com/bundle/pingfederate-110/page/spk1642790928508.html"}],"source":{"advisory":"SECBL021","defect":["PF-30450"],"discovery":"INTERNAL"},"title":"PingFederate Password Reset via Authentication API Mishandling","x_legacyV4Record":{"CVE_data_meta":{"ASSIGNER":"responsible-disclosure@pingidentity.com","ID":"CVE-2022-23722","STATE":"PUBLIC","TITLE":"PingFederate Password Reset via Authentication API Mishandling"},"affects":{"vendor":{"vendor_data":[{"product":{"product_data":[{"product_name":"PingFederate","version":{"version_data":[{"version_affected":"<=","version_name":"11.0","version_value":"11.0"},{"version_affected":"<=","version_name":"10.3","version_value":"10.3.4"},{"version_affected":"<=","version_name":"10.2","version_value":"10.2.7"},{"version_affected":"<=","version_name":"10.1","version_value":"10.1.9"},{"version_affected":"<=","version_name":"10.0","version_value":"10.0.12"},{"version_affected":"<=","version_name":"9.3","version_value":"9.3.3P16"}]}}]},"vendor_name":"Ping Identity"}]}},"data_format":"MITRE","data_type":"CVE","data_version":"4.0","description":{"description_data":[{"lang":"eng","value":"When a password reset mechanism is configured to use the Authentication API with an Authentication Policy, email One-Time Password, PingID or SMS authentication, an existing user can reset another existing user’s password."}]},"problemtype":{"problemtype_data":[{"description":[{"lang":"eng","value":"CWE-288 Authentication Bypass Using an Alternate Path or Channel"}]}]},"references":{"reference_data":[{"name":"https://www.pingidentity.com/en/resources/downloads/pingfederate.html","refsource":"MISC","url":"https://www.pingidentity.com/en/resources/downloads/pingfederate.html"},{"name":"https://docs.pingidentity.com/bundle/pingfederate-110/page/spk1642790928508.html","refsource":"MISC","url":"https://docs.pingidentity.com/bundle/pingfederate-110/page/spk1642790928508.html"}]},"source":{"advisory":"SECBL021","defect":["PF-30450"],"discovery":"INTERNAL"}}},"adp":[{"providerMetadata":{"orgId":"af854a3a-2127-422b-91ae-364da2661108","shortName":"CVE","dateUpdated":"2024-08-03T03:51:46.174Z"},"title":"CVE Program Container","references":[{"tags":["x_refsource_MISC","x_transferred"],"url":"https://www.pingidentity.com/en/resources/downloads/pingfederate.html"},{"tags":["x_refsource_MISC","x_transferred"],"url":"https://docs.pingidentity.com/bundle/pingfederate-110/page/spk1642790928508.html"}]}]},"cveMetadata":{"assignerOrgId":"5998a2e9-ae88-42cd-b6e0-7564fd979f9e","assignerShortName":"Ping Identity","cveId":"CVE-2022-23722","datePublished":"2022-05-02T22:05:13.000Z","dateReserved":"2022-01-19T00:00:00.000Z","dateUpdated":"2024-08-03T03:51:46.174Z","state":"PUBLISHED"},"dataType":"CVE_RECORD","dataVersion":"5.1"}