2024-07-14 02:06:08 +00:00

98 lines
3.2 KiB
JSON

{
"id": "CVE-2022-30935",
"sourceIdentifier": "cve@mitre.org",
"published": "2022-09-28T11:15:09.593",
"lastModified": "2022-09-30T13:35:31.670",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "An authorization bypass in b2evolution allows remote, unauthenticated attackers to predict password reset tokens for any user through the use of a bad randomness function. This allows the attacker to get valid sessions for arbitrary users, and optionally reset their password. Tested and confirmed in a default installation of version 7.2.3. Earlier versions are affected, possibly earlier major versions as well."
},
{
"lang": "es",
"value": "Una omisi\u00f3n de autorizaci\u00f3n en b2evolution permite a atacantes remotos no autenticados predecir tokens de restablecimiento de contrase\u00f1a para cualquier usuario mediante el uso de una funci\u00f3n de aleatoriedad incorrecta. Esto permite al atacante obtener sesiones v\u00e1lidas para usuarios arbitrarios, y opcionalmente restablecer su contrase\u00f1a. Probado y confirmado en una instalaci\u00f3n por defecto de la versi\u00f3n 7.2.3. Las versiones anteriores est\u00e1n afectadas, posiblemente tambi\u00e9n las versiones mayores anteriores"
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "NONE",
"baseScore": 9.1,
"baseSeverity": "CRITICAL"
},
"exploitabilityScore": 3.9,
"impactScore": 5.2
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-330"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:b2evolution:b2evolution:*:*:*:*:*:*:*:*",
"versionEndExcluding": "7.2.5",
"matchCriteriaId": "A47FAABB-782C-4713-86A0-F0ADCC977841"
}
]
}
]
}
],
"references": [
{
"url": "https://b2evolution.net/downloads/7-2-5-stable",
"source": "cve@mitre.org",
"tags": [
"Patch",
"Vendor Advisory"
]
},
{
"url": "https://github.com/b2evolution/b2evolution/blob/master/inc/_core/_misc.funcs.php#L5955",
"source": "cve@mitre.org",
"tags": [
"Patch",
"Third Party Advisory"
]
},
{
"url": "https://github.com/b2evolution/b2evolution/issues/114",
"source": "cve@mitre.org",
"tags": [
"Issue Tracking",
"Third Party Advisory"
]
}
]
}