2023-04-24 12:24:31 +02:00
{
"id" : "CVE-2022-32175" ,
"sourceIdentifier" : "vulnerabilitylab@mend.io" ,
"published" : "2022-10-11T15:15:09.920" ,
2023-11-07 21:03:21 +00:00
"lastModified" : "2023-11-07T03:47:45.377" ,
"vulnStatus" : "Modified" ,
2023-04-24 12:24:31 +02:00
"descriptions" : [
{
"lang" : "en" ,
"value" : "In AdGuardHome, versions v0.95 through v0.108.0-b.13 are vulnerable to Cross-Site Request Forgery (CSRF), in the custom filtering rules functionality. An attacker can persuade an authorized user to follow a malicious link, resulting in deleting/modifying the custom filtering rules."
} ,
{
"lang" : "es" ,
"value" : "En AdGuardHome, versiones v0.95 hasta v0.108.0-b.13, son vulnerables a un ataque de tipo Cross-Site Request Forgery (CSRF), en la funcionalidad custom filtering rules. Un atacante puede persuadir a un usuario autorizado para que siga un enlace malicioso, resultando en una eliminaci\u00f3n/modificaci\u00f3n de las reglas de filtrado personalizadas"
}
] ,
"metrics" : {
"cvssMetricV31" : [
{
"source" : "nvd@nist.gov" ,
"type" : "Primary" ,
"cvssData" : {
"version" : "3.1" ,
"vectorString" : "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:L" ,
"attackVector" : "NETWORK" ,
"attackComplexity" : "LOW" ,
"privilegesRequired" : "NONE" ,
"userInteraction" : "REQUIRED" ,
"scope" : "UNCHANGED" ,
"confidentialityImpact" : "NONE" ,
"integrityImpact" : "LOW" ,
"availabilityImpact" : "LOW" ,
"baseScore" : 5.4 ,
"baseSeverity" : "MEDIUM"
} ,
"exploitabilityScore" : 2.8 ,
"impactScore" : 2.5
}
]
} ,
"weaknesses" : [
{
2023-11-07 21:03:21 +00:00
"source" : "478c68dd-22c1-4a41-97cd-654224dfacff" ,
2023-04-24 12:24:31 +02:00
"type" : "Primary" ,
"description" : [
{
"lang" : "en" ,
"value" : "CWE-352"
}
]
}
] ,
"configurations" : [
{
"nodes" : [
{
"operator" : "OR" ,
"negate" : false ,
"cpeMatch" : [
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:adguard:adguardhome:*:*:*:*:*:*:*:*" ,
"versionStartIncluding" : "0.95" ,
"versionEndExcluding" : "0.108" ,
"matchCriteriaId" : "8E695CFB-B1DF-41C1-BA70-7A265433CB0A"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:adguard:adguardhome:0.108:-:*:*:*:*:*:*" ,
"matchCriteriaId" : "14E5C5F8-F953-46F8-8A09-D3ADD8D20D98"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:adguard:adguardhome:0.108:beta1:*:*:*:*:*:*" ,
"matchCriteriaId" : "9817B935-B524-477A-AD09-8FAA10766BB2"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:adguard:adguardhome:0.108:beta10:*:*:*:*:*:*" ,
"matchCriteriaId" : "483D39D7-80FC-44AB-9DFE-AFDAE36D062B"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:adguard:adguardhome:0.108:beta11:*:*:*:*:*:*" ,
"matchCriteriaId" : "254E666F-03B2-4165-8B99-F952DFAB8C9D"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:adguard:adguardhome:0.108:beta12:*:*:*:*:*:*" ,
"matchCriteriaId" : "5A73C9B8-9DA5-408F-9606-56CEF156D778"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:adguard:adguardhome:0.108:beta2:*:*:*:*:*:*" ,
"matchCriteriaId" : "C2FA24D7-69D9-4754-8BFB-4C7FCBD32C21"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:adguard:adguardhome:0.108:beta3:*:*:*:*:*:*" ,
"matchCriteriaId" : "48BDB15F-0B8F-4924-9D10-1D9553E00C14"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:adguard:adguardhome:0.108:beta4:*:*:*:*:*:*" ,
"matchCriteriaId" : "E1D1A5BC-FF61-4DAD-B151-F54744B46F21"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:adguard:adguardhome:0.108:beta5:*:*:*:*:*:*" ,
"matchCriteriaId" : "AF880BA6-46D1-46E2-9CCD-29CB7723B25F"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:adguard:adguardhome:0.108:beta6:*:*:*:*:*:*" ,
"matchCriteriaId" : "81C91E59-C03C-45B9-A453-7921D4345B86"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:adguard:adguardhome:0.108:beta7:*:*:*:*:*:*" ,
"matchCriteriaId" : "DE4E8637-A8F0-411A-9106-6FD4B2B64447"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:adguard:adguardhome:0.108:beta8:*:*:*:*:*:*" ,
"matchCriteriaId" : "27DC4B6A-9C14-4348-AC6E-57EB022467FA"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:adguard:adguardhome:0.108:beta9:*:*:*:*:*:*" ,
"matchCriteriaId" : "58D1AB54-26E8-4A60-91E2-4105E186533B"
}
]
}
]
}
] ,
"references" : [
{
"url" : "https://github.com/AdguardTeam/AdGuardHome/blob/v0.108.0-b.13/internal/home/controlfiltering.go#L265" ,
"source" : "vulnerabilitylab@mend.io" ,
"tags" : [
"Exploit" ,
"Third Party Advisory"
]
} ,
{
"url" : "https://www.mend.io/vulnerability-database/CVE-2022-32175" ,
"source" : "vulnerabilitylab@mend.io" ,
"tags" : [
"Exploit" ,
"Third Party Advisory"
]
}
]
}