cve/2022/CVE-2022-23067.md
2024-06-18 02:51:15 +02:00

18 lines
894 B
Markdown
Raw Permalink Blame History

This file contains ambiguous Unicode characters

This file contains Unicode characters that might be confused with other characters. If you think that this is intentional, you can safely ignore this warning. Use the Escape button to reveal them.

### [CVE-2022-23067](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23067)
![](https://img.shields.io/static/v1?label=Product&message=ToolJet&color=blue)
![](https://img.shields.io/static/v1?label=Version&message=%3E%3D%200.5.0%20&color=brighgreen)
![](https://img.shields.io/static/v1?label=Vulnerability&message=CWE-200%20Information%20Exposure&color=brighgreen)
### Description
ToolJet versions v0.5.0 to v1.2.2 are vulnerable to token leakage via Referer header that leads to account takeover . If the user opens the invite link/signup link and then clicks on any external links within the page, it leaks the password set token/signup token in the referer header. Using these tokens the attacker can access the users account.
### POC
#### Reference
- https://www.whitesourcesoftware.com/vulnerability-database/CVE-2022-23067
#### Github
No PoCs found on GitHub currently.