CVE-2022-22691

The password reset component deployed within Umbraco uses the hostname supplied within the request host header when building a password reset URL. It may be possible to manipulate the URL sent to Umbraco users when so that it points to the attackers server thereby disclosing the password reset token if/when the link is followed. A related vulnerability (CVE-2022-22690) could allow this flaw to become persistent so that all password reset URLs are affected persistently following a successful attack. See the AppCheck advisory for further information and associated caveats.
Configurations

Configuration 1 (hide)

cpe:2.3:a:umbraco:umbraco_cms:*:*:*:*:*:*:*:*

History

21 Nov 2024, 06:47

Type Values Removed Values Added
CVSS v2 : 4.3
v3 : 7.4
v2 : 4.3
v3 : 6.8
References () https://appcheck-ng.com/umbraco-applicationurl-overwrite-persistent-password-reset-poison-cve-2022-22690-cve-2022-22691/ - Exploit, Mitigation, Third Party Advisory () https://appcheck-ng.com/umbraco-applicationurl-overwrite-persistent-password-reset-poison-cve-2022-22690-cve-2022-22691/ - Exploit, Mitigation, Third Party Advisory

Information

Published : 2022-01-18 17:15

Updated : 2024-11-21 06:47


NVD link : CVE-2022-22691

Mitre link : CVE-2022-22691

CVE.ORG link : CVE-2022-22691


JSON object : View

Products Affected

umbraco

  • umbraco_cms
CWE
CWE-640

Weak Password Recovery Mechanism for Forgotten Password

CWE-444

Inconsistent Interpretation of HTTP Requests ('HTTP Request/Response Smuggling')