{"dataType":"CVE_RECORD","dataVersion":"5.1","cveMetadata":{"state":"PUBLISHED","cveId":"CVE-2022-4611","assignerOrgId":"1af790b2-7ee1-4545-860a-a788eba489b5","assignerShortName":"VulDB","dateUpdated":"2024-08-03T01:48:38.704Z","dateReserved":"2022-12-19T00:00:00.000Z","datePublished":"2022-12-19T00:00:00.000Z"},"containers":{"cna":{"providerMetadata":{"orgId":"1af790b2-7ee1-4545-860a-a788eba489b5","shortName":"VulDB","dateUpdated":"2022-12-28T20:16:34.928Z"},"title":"Click Studios Passwordstate hard-coded credentials","problemTypes":[{"descriptions":[{"type":"CWE","cweId":"CWE-798","lang":"en","description":"CWE-798 Hard-coded Credentials"}]}],"affected":[{"vendor":"Click Studios","product":"Passwordstate","versions":[{"version":"n/a","status":"affected"}]},{"vendor":"Click Studios","product":"Passwordstate Browser Extension Chrome","versions":[{"version":"n/a","status":"affected"}]}],"descriptions":[{"lang":"en","value":"A vulnerability, which was classified as problematic, was found in Click Studios Passwordstate and Passwordstate Browser Extension Chrome. This affects an unknown part. The manipulation leads to hard-coded credentials. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. It is recommended to upgrade the affected component. The identifier VDB-216273 was assigned to this vulnerability."},{"lang":"de","value":"Es wurde eine problematische Schwachstelle in Click Studios Passwordstate and Passwordstate Browser Extension Chrome gefunden. Dabei betrifft es einen unbekannter Codeteil. Mit der Manipulation mit unbekannten Daten kann eine hard-coded credentials-Schwachstelle ausgenutzt werden. Die Umsetzung des Angriffs kann dabei über das Netzwerk erfolgen. Der Exploit steht zur öffentlichen Verfügung. Als bestmögliche Massnahme wird das Einspielen eines Upgrades empfohlen."}],"metrics":[{"cvssV3_1":{"version":"3.1","baseScore":4.3,"vectorString":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N","baseSeverity":"MEDIUM"}},{"cvssV3_0":{"version":"3.0","baseScore":4.3,"vectorString":"CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N","baseSeverity":"MEDIUM"}}],"timeline":[{"time":"2022-12-19T00:00:00.000Z","lang":"en","value":"Advisory disclosed"},{"time":"2022-12-19T01:00:00.000Z","lang":"en","value":"VulDB entry created"},{"time":"2022-12-19T15:21:02.000Z","lang":"en","value":"VulDB last update"}],"credits":[{"lang":"en","value":"Constantin Müller","type":"finder"},{"lang":"en","value":"Jan Benninger","type":"finder"},{"lang":"en","value":"Pascal Zenker","type":"finder"}],"references":[{"url":"https://vuldb.com/?id.216273","tags":["vdb-entry"]},{"url":"https://vuldb.com/?ctiid.216273","tags":["signature","permissions-required"]},{"url":"https://modzero.com/modlog/archives/2022/12/19/better_make_sure_your_password_manager_is_secure/index.html","tags":["exploit"]}]},"adp":[{"providerMetadata":{"orgId":"af854a3a-2127-422b-91ae-364da2661108","shortName":"CVE","dateUpdated":"2024-08-03T01:48:38.704Z"},"title":"CVE Program Container","references":[{"url":"https://vuldb.com/?id.216273","tags":["vdb-entry","x_transferred"]},{"url":"https://vuldb.com/?ctiid.216273","tags":["signature","permissions-required","x_transferred"]},{"url":"https://modzero.com/modlog/archives/2022/12/19/better_make_sure_your_password_manager_is_secure/index.html","tags":["exploit","x_transferred"]}]}]}}