162 lines
5.2 KiB
JSON
Raw Normal View History

2023-04-24 12:24:31 +02:00
{
"id": "CVE-2022-4612",
"sourceIdentifier": "cna@vuldb.com",
"published": "2022-12-19T15:15:10.443",
"lastModified": "2022-12-23T21:23:43.200",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
"value": "A vulnerability has been found in Click Studios Passwordstate and Passwordstate Browser Extension Chrome and classified as problematic. This vulnerability affects unknown code. The manipulation leads to insufficiently protected credentials. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. It is recommended to upgrade the affected component. VDB-216274 is the identifier assigned to this vulnerability."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"availabilityImpact": "NONE",
"baseScore": 6.5,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.8,
"impactScore": 3.6
},
{
"source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "NONE",
"availabilityImpact": "NONE",
"baseScore": 4.3,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.8,
"impactScore": 1.4
}
]
},
"weaknesses": [
{
"source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-522"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:clickstudios:passwordstate:*:*:*:*:*:*:*:*",
"versionEndExcluding": "9.5",
"matchCriteriaId": "33EF0704-7BE3-48EB-8F0A-02101FBA158C"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:clickstudios:passwordstate:9.5:build_9500:*:*:*:-:*:*",
"matchCriteriaId": "53FFDC0B-0F74-494D-9CBE-2DAC27B040EF"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:clickstudios:passwordstate:9.5:build_9512:*:*:*:-:*:*",
"matchCriteriaId": "86308402-59E4-4F27-BF2B-B5C3E4DC4A95"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:clickstudios:passwordstate:9.5:build_9519:*:*:*:-:*:*",
"matchCriteriaId": "7B3EBBD3-EBFF-4A7E-9425-1DCF431DE4F1"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:clickstudios:passwordstate:9.5:build_9531:*:*:*:-:*:*",
"matchCriteriaId": "D4BB7778-9669-43A2-9E72-7EE2CC8EDB51"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:clickstudios:passwordstate:9.5:build_9533:*:*:*:-:*:*",
"matchCriteriaId": "5E41BACC-4F74-4A9A-9C8B-B1FF661B3B70"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:clickstudios:passwordstate:9.5:build_9535:*:*:*:-:*:*",
"matchCriteriaId": "B0EFF8C9-3F2C-454E-811D-257FA41C6CDD"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:clickstudios:passwordstate:9.5:build_9583:*:*:*:-:*:*",
"matchCriteriaId": "C0B5D5D0-3DEC-4492-BED9-C5267C4BA281"
}
]
}
]
},
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:clickstudios:passwordstate:9.5.8.4:*:*:*:*:chrome:*:*",
"matchCriteriaId": "8CFF9226-D49B-42F9-A553-B3F6FD8413C3"
}
]
}
]
}
],
"references": [
{
"url": "https://modzero.com/modlog/archives/2022/12/19/better_make_sure_your_password_manager_is_secure/index.html",
"source": "cna@vuldb.com",
"tags": [
"Exploit",
"Third Party Advisory"
]
},
{
"url": "https://vuldb.com/?id.216274",
"source": "cna@vuldb.com",
"tags": [
"Third Party Advisory"
]
},
{
"url": "https://www.modzero.com/static/MZ-22-03_Passwordstate_Security_Disclosure_Report-v1.0.pdf",
"source": "cna@vuldb.com",
"tags": [
"Exploit",
"Third Party Advisory"
]
}
]
}