Vulnerability Description
The forgot password token basically just makes us capable of taking over the account of whoever comment in an app that we can see (bruteforcing comment id's might also be an option but I wouldn't count on it, since it would take a long time to find a valid one).
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Tooljet | Tooljet | < 1.23.0 |
Related Weaknesses (CWE)
References
- https://github.com/tooljet/tooljet/commit/45e0d3302d92df7d7f2d609c31cea71165600bPatchThird Party Advisory
- https://huntr.dev/bounties/a610300b-ce3c-4995-8337-11942b3621bfExploitPatchThird Party Advisory
- https://github.com/tooljet/tooljet/commit/45e0d3302d92df7d7f2d609c31cea71165600bPatchThird Party Advisory
- https://huntr.dev/bounties/a610300b-ce3c-4995-8337-11942b3621bfExploitPatchThird Party Advisory
FAQ
What is CVE-2022-3019?
CVE-2022-3019 is a vulnerability with a CVSS score of 8.8 (HIGH). The forgot password token basically just makes us capable of taking over the account of whoever comment in an app that we can see (bruteforcing comment id's might also be an option but I wouldn't coun...
How severe is CVE-2022-3019?
CVE-2022-3019 has been rated HIGH with a CVSS base score of 8.8/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2022-3019?
Check the references section above for vendor advisories and patch information. Affected products include: Tooljet Tooljet.