Vulnerability Description
An improper access control vulnerability exists in Rocket.Chat <v5, <v4.8.2 and <v4.7.5 due to input data in the getUsersOfRoom Meteor server method is not type validated, so that MongoDB query operator objects are accepted by the server, so that instead of a matching rid String a$regex query can be executed, bypassing the room access permission check for every but the first matching room.
CVSS Score
MEDIUM
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Rocket.Chat | Rocket.Chat | < 4.7.5 |
Related Weaknesses (CWE)
References
- https://hackerone.com/reports/1410357ExploitIssue TrackingThird Party Advisory
- https://hackerone.com/reports/1410357ExploitIssue TrackingThird Party Advisory
FAQ
What is CVE-2022-32226?
CVE-2022-32226 is a vulnerability with a CVSS score of 4.3 (MEDIUM). An improper access control vulnerability exists in Rocket.Chat <v5, <v4.8.2 and <v4.7.5 due to input data in the getUsersOfRoom Meteor server method is not type validated, so that MongoDB query operat...
How severe is CVE-2022-32226?
CVE-2022-32226 has been rated MEDIUM with a CVSS base score of 4.3/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2022-32226?
Check the references section above for vendor advisories and patch information. Affected products include: Rocket.Chat Rocket.Chat.