Vulnerability Details : CVE-2022-3348
Potential exploit
Just like in the previous report, an attacker could steal the account of different users. But in this case, it's a little bit more specific, because it is needed to be an editor in the same app as the victim.
Vulnerability category: Information leak
Products affected by CVE-2022-3348
- cpe:2.3:a:tooljet:tooljet:*:*:*:*:*:*:*:*
Exploit prediction scoring system (EPSS) score for CVE-2022-3348
0.07%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 18 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2022-3348
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
6.5
|
MEDIUM | CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:N |
1.2
|
5.2
|
huntr.dev | |
4.9
|
MEDIUM | CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N |
1.2
|
3.6
|
NIST |
CWE ids for CVE-2022-3348
-
The product exposes sensitive information to an actor that is not explicitly authorized to have access to that information.Assigned by: security@huntr.dev (Primary)
References for CVE-2022-3348
-
https://github.com/tooljet/tooljet/commit/37bf6de75f161e03c2a81888810488b913863a46
fix: hide user data from thread module · ToolJet/ToolJet@37bf6de · GitHubPatch;Third Party Advisory
-
https://huntr.dev/bounties/aae4aeb8-2612-4254-85e5-90675b082eac
Exposure of "Forgot Password" Token on Threads Controller Leads to Account Takeover vulnerability found in tooljetExploit;Patch;Third Party Advisory
Jump to