Vulnerability Description
An issue was discovered in MISP before 2.4.158. In UsersController.php, password confirmation can be bypassed via vectors involving an "Accept: application/json" header.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Misp | Misp | < 2.4.158 |
Related Weaknesses (CWE)
References
- https://github.com/MISP/MISP/commit/01120163a6b4d905029d416e7305575df31df8afPatchThird Party Advisory
- https://github.com/MISP/MISP/compare/v2.4.157...v2.4.158Release NotesThird Party Advisory
- https://zigrin.com/advisories/misp-password-confirmation-can-be-bypassed/Third Party Advisory
- https://zigrin.com/cakephp-application-cybersecurity-research-the-impact-of-a-phExploitThird Party Advisory
- https://github.com/MISP/MISP/commit/01120163a6b4d905029d416e7305575df31df8afPatchThird Party Advisory
- https://github.com/MISP/MISP/compare/v2.4.157...v2.4.158Release NotesThird Party Advisory
- https://zigrin.com/advisories/misp-password-confirmation-can-be-bypassed/Third Party Advisory
- https://zigrin.com/cakephp-application-cybersecurity-research-the-impact-of-a-phExploitThird Party Advisory
FAQ
What is CVE-2022-29534?
CVE-2022-29534 is a vulnerability with a CVSS score of 7.5 (HIGH). An issue was discovered in MISP before 2.4.158. In UsersController.php, password confirmation can be bypassed via vectors involving an "Accept: application/json" header.
How severe is CVE-2022-29534?
CVE-2022-29534 has been rated HIGH with a CVSS base score of 7.5/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2022-29534?
Check the references section above for vendor advisories and patch information. Affected products include: Misp Misp.