Ecosyste.ms: Advisories
An open API service providing security vulnerability metadata for many open source software ecosystems.
Security Advisories: GSA_kwCzR0hTQS1ycDdmLWZobTgtOWhwZs4AAwAJ
Account Takeover Through Password Reset Poisoning
Microweber 1.2.15 was discovered to allow attackers to perform an account takeover via a host header injection attack.
Permalink: https://github.com/advisories/GHSA-rp7f-fhm8-9hpfJSON: https://advisories.ecosyste.ms/api/v1/advisories/GSA_kwCzR0hTQS1ycDdmLWZobTgtOWhwZs4AAwAJ
Source: GitHub Advisory Database
Origin: Unspecified
Severity: High
Classification: General
Published: about 2 years ago
Updated: almost 2 years ago
CVSS Score: 8.8
CVSS vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
EPSS Percentage: 0.00344
EPSS Percentile: 0.71283
Identifiers: GHSA-rp7f-fhm8-9hpf, CVE-2022-33012
References:
- https://nvd.nist.gov/vuln/detail/CVE-2022-33012
- https://blog.jitendrapatro.me/cve-2022-33012-account-takeover-through-password-reset-poisoning/
- https://www.pethuraj.com/blog/how-i-earned-800-for-host-header-injection-vulnerability/
- https://github.com/microweber/microweber
- https://github.com/swisskyrepo/PayloadsAllTheThings/tree/master/Account%20Takeover#account-takeover-through-password-reset-poisoning
- https://github.com/advisories/GHSA-rp7f-fhm8-9hpf
Blast Radius: 6.2
Affected Packages
packagist:microweber/microweber
Dependent packages: 1Dependent repositories: 5
Downloads: 13,089 total
Affected Version Ranges: <= 1.2.15
No known fixed version
All affected versions: 0.9.346, 1.0.3, 1.0.4, 1.0.5, 1.0.6, 1.0.7, 1.2.3, 1.2.4, 1.2.5, 1.2.6, 1.2.7, 1.2.8, 1.2.9, 1.2.10, 1.2.11, 1.2.12, 1.2.13, 1.2.14, 1.2.15