CVE-2022-22691

The password reset component deployed within Umbraco uses the hostname supplied within the request host header when building a password reset URL. It may be possible to manipulate the URL sent to Umbraco users when so that it points to the attackers server thereby disclosing the password reset token if/when the link is followed. A related vulnerability (CVE-2022-22690) could allow this flaw to become persistent so that all password reset URLs are affected persistently following a successful attack. See the AppCheck advisory for further information and associated caveats.
Configurations

Configuration 1 (hide)

cpe:2.3:a:umbraco:umbraco_cms:*:*:*:*:*:*:*:*

History

26 Jan 2022, 17:03

Type Values Removed Values Added
CWE CWE-444
CVSS v2 : unknown
v3 : unknown
v2 : 4.3
v3 : 7.4
CPE cpe:2.3:a:umbraco:umbraco_cms:*:*:*:*:*:*:*:*
References (MISC) https://appcheck-ng.com/umbraco-applicationurl-overwrite-persistent-password-reset-poison-cve-2022-22690-cve-2022-22691/ - (MISC) https://appcheck-ng.com/umbraco-applicationurl-overwrite-persistent-password-reset-poison-cve-2022-22690-cve-2022-22691/ - Exploit, Mitigation, Third Party Advisory

18 Jan 2022, 18:01

Type Values Removed Values Added
New CVE

Information

Published : 2022-01-18 17:15

Updated : 2024-02-04 22:08


NVD link : CVE-2022-22691

Mitre link : CVE-2022-22691

CVE.ORG link : CVE-2022-22691


JSON object : View

Products Affected

umbraco

  • umbraco_cms
CWE
CWE-444

Inconsistent Interpretation of HTTP Requests ('HTTP Request Smuggling')

CWE-640

Weak Password Recovery Mechanism for Forgotten Password