{"dataType":"CVE_RECORD","dataVersion":"5.1","cveMetadata":{"state":"PUBLISHED","cveId":"CVE-2022-3422","assignerOrgId":"c09c270a-b464-47c1-9133-acb35b22c19a","assignerShortName":"@huntrdev","dateUpdated":"2024-08-03T01:07:06.576Z","dateReserved":"2022-10-07T00:00:00.000Z","datePublished":"2022-10-07T00:00:00.000Z"},"containers":{"cna":{"title":"Improper Privilege Management in tooljet/tooljet","providerMetadata":{"orgId":"c09c270a-b464-47c1-9133-acb35b22c19a","shortName":"@huntrdev","dateUpdated":"2022-10-07T00:00:00.000Z"},"descriptions":[{"lang":"en","value":"Account Takeover :: when see the info i can see the hash pass i can creaked it ............... Account Takeover :: when see the info i can see the forgot_password_token the hacker can send the request and changed the pass"}],"affected":[{"vendor":"tooljet","product":"tooljet/tooljet","versions":[{"version":"unspecified","lessThan":"v1.26.1","status":"affected","versionType":"custom"}]}],"references":[{"url":"https://huntr.dev/bounties/02da53ab-f613-4171-8766-96b31c671551"},{"url":"https://github.com/tooljet/tooljet/commit/7879d8a76000c014533a97a22bc276afe3ae3e54"}],"metrics":[{"cvssV3_0":{"version":"3.0","vectorString":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"HIGH","baseScore":9.8,"baseSeverity":"CRITICAL"}}],"problemTypes":[{"descriptions":[{"type":"CWE","lang":"en","description":"CWE-269 Improper Privilege Management","cweId":"CWE-269"}]}],"source":{"advisory":"02da53ab-f613-4171-8766-96b31c671551","discovery":"EXTERNAL"}},"adp":[{"providerMetadata":{"orgId":"af854a3a-2127-422b-91ae-364da2661108","shortName":"CVE","dateUpdated":"2024-08-03T01:07:06.576Z"},"title":"CVE Program Container","references":[{"url":"https://huntr.dev/bounties/02da53ab-f613-4171-8766-96b31c671551","tags":["x_transferred"]},{"url":"https://github.com/tooljet/tooljet/commit/7879d8a76000c014533a97a22bc276afe3ae3e54","tags":["x_transferred"]}]}]}}