Just like in the previous report, an attacker could steal the account of different users. But in this case, it's a little bit more specific, because it is needed to be an editor in the same app as the victim.
References
Link | Resource |
---|---|
https://github.com/tooljet/tooljet/commit/37bf6de75f161e03c2a81888810488b913863a46 | Patch Third Party Advisory |
https://huntr.dev/bounties/aae4aeb8-2612-4254-85e5-90675b082eac | Exploit Patch Third Party Advisory |
https://github.com/tooljet/tooljet/commit/37bf6de75f161e03c2a81888810488b913863a46 | Patch Third Party Advisory |
https://huntr.dev/bounties/aae4aeb8-2612-4254-85e5-90675b082eac | Exploit Patch Third Party Advisory |
Configurations
History
21 Nov 2024, 07:19
Type | Values Removed | Values Added |
---|---|---|
References | () https://github.com/tooljet/tooljet/commit/37bf6de75f161e03c2a81888810488b913863a46 - Patch, Third Party Advisory | |
References | () https://huntr.dev/bounties/aae4aeb8-2612-4254-85e5-90675b082eac - Exploit, Patch, Third Party Advisory |
Information
Published : 2022-09-28 09:15
Updated : 2024-11-21 07:19
NVD link : CVE-2022-3348
Mitre link : CVE-2022-3348
CVE.ORG link : CVE-2022-3348
JSON object : View
Products Affected
tooljet
- tooljet
CWE
CWE-200
Exposure of Sensitive Information to an Unauthorized Actor