2023-04-24 12:24:31 +02:00
{
"id" : "CVE-2022-22120" ,
"sourceIdentifier" : "vulnerabilitylab@mend.io" ,
"published" : "2022-01-10T16:15:10.180" ,
2024-11-23 15:12:23 +00:00
"lastModified" : "2024-11-21T06:46:13.263" ,
"vulnStatus" : "Modified" ,
2024-12-08 03:06:42 +00:00
"cveTags" : [ ] ,
2023-04-24 12:24:31 +02:00
"descriptions" : [
{
"lang" : "en" ,
"value" : "In NocoDB, versions 0.9 to 0.83.8 are vulnerable to Observable Discrepancy in the password-reset feature. When requesting a password reset for a given email address, the application displays an error message when the email isn't registered within the system. This allows attackers to enumerate the registered users' email addresses."
} ,
{
"lang" : "es" ,
"value" : "En NocoDB, versiones 0.9 a 0.83.8, son vulnerables a una Discrepancia Observable en la funcionalidad password-reset. Cuando es solicitado un restablecimiento de contrase\u00f1a para una direcci\u00f3n de correo electr\u00f3nico determinada, la aplicaci\u00f3n muestra un mensaje de error cuando el correo electr\u00f3nico no est\u00e1 registrado en el sistema. Esto permite a atacantes enumerar las direcciones de correo electr\u00f3nico de usuarios registrados"
}
] ,
"metrics" : {
"cvssMetricV31" : [
{
"source" : "vulnerabilitylab@mend.io" ,
2024-11-23 15:12:23 +00:00
"type" : "Secondary" ,
2023-04-24 12:24:31 +02:00
"cvssData" : {
"version" : "3.1" ,
"vectorString" : "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" ,
2024-11-23 15:12:23 +00:00
"baseScore" : 5.3 ,
"baseSeverity" : "MEDIUM" ,
2023-04-24 12:24:31 +02:00
"attackVector" : "NETWORK" ,
"attackComplexity" : "LOW" ,
"privilegesRequired" : "NONE" ,
"userInteraction" : "NONE" ,
"scope" : "UNCHANGED" ,
"confidentialityImpact" : "LOW" ,
"integrityImpact" : "NONE" ,
2024-11-23 15:12:23 +00:00
"availabilityImpact" : "NONE"
2023-04-24 12:24:31 +02:00
} ,
"exploitabilityScore" : 3.9 ,
"impactScore" : 1.4
}
] ,
"cvssMetricV2" : [
{
"source" : "nvd@nist.gov" ,
"type" : "Primary" ,
"cvssData" : {
"version" : "2.0" ,
"vectorString" : "AV:N/AC:L/Au:N/C:P/I:N/A:N" ,
2024-11-23 15:12:23 +00:00
"baseScore" : 5.0 ,
2023-04-24 12:24:31 +02:00
"accessVector" : "NETWORK" ,
"accessComplexity" : "LOW" ,
"authentication" : "NONE" ,
"confidentialityImpact" : "PARTIAL" ,
"integrityImpact" : "NONE" ,
2024-11-23 15:12:23 +00:00
"availabilityImpact" : "NONE"
2023-04-24 12:24:31 +02:00
} ,
"baseSeverity" : "MEDIUM" ,
"exploitabilityScore" : 10.0 ,
"impactScore" : 2.9 ,
"acInsufInfo" : false ,
"obtainAllPrivilege" : false ,
"obtainUserPrivilege" : false ,
"obtainOtherPrivilege" : false ,
"userInteractionRequired" : false
}
]
} ,
"weaknesses" : [
{
"source" : "vulnerabilitylab@mend.io" ,
2024-12-15 03:03:56 +00:00
"type" : "Primary" ,
2023-04-24 12:24:31 +02:00
"description" : [
{
"lang" : "en" ,
"value" : "CWE-203"
}
]
}
] ,
"configurations" : [
{
"nodes" : [
{
"operator" : "OR" ,
"negate" : false ,
"cpeMatch" : [
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:xgenecloud:nocodb:*:*:*:*:*:*:*:*" ,
"versionStartIncluding" : "0.9" ,
"versionEndIncluding" : "0.83.8" ,
"matchCriteriaId" : "9A317204-AB4B-4E4B-AD96-8A04CBD690D0"
}
]
}
]
}
] ,
"references" : [
{
"url" : "https://github.com/nocodb/nocodb/commit/f46e89b0" ,
"source" : "vulnerabilitylab@mend.io" ,
"tags" : [
"Patch" ,
"Third Party Advisory"
]
} ,
{
"url" : "https://www.whitesourcesoftware.com/vulnerability-database/CVE-2022-22120" ,
"source" : "vulnerabilitylab@mend.io" ,
"tags" : [
"Exploit" ,
"Third Party Advisory"
]
2024-11-23 15:12:23 +00:00
} ,
{
"url" : "https://github.com/nocodb/nocodb/commit/f46e89b0" ,
"source" : "af854a3a-2127-422b-91ae-364da2661108" ,
"tags" : [
"Patch" ,
"Third Party Advisory"
]
} ,
{
"url" : "https://www.whitesourcesoftware.com/vulnerability-database/CVE-2022-22120" ,
"source" : "af854a3a-2127-422b-91ae-364da2661108" ,
"tags" : [
"Exploit" ,
"Third Party Advisory"
]
2023-04-24 12:24:31 +02:00
}
]
}