Lucene search

K
gitlabHttps://gitlab.com/gitlab-org/security-products/gemnasium-dbGITLAB-16E647FF7331994FDC4520C3143E5DCC
HistoryJul 29, 2022 - 12:00 a.m.

Duplicate of ./pypi/Flask-AppBuilder/CVE-2022-31177.yml

2022-07-2900:00:00
https://gitlab.com/gitlab-org/security-products/gemnasium-db
gitlab.com
9

2.7 Low

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

HIGH

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

LOW

Integrity Impact

NONE

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:N/A:N

0.001 Low

EPSS

Percentile

19.4%

Impact

An authenticated Admin user could craft HTTP requests to filter users by their salted and hashed passwords strings. These filters could be made by using partial hashed password strings. The response would not include the hashed passwords, but an attacker could infer partial password hashes and their respective users.

Only when using AUTH_DB database authentication option.

Patches

Fixed on 4.1.3

For more information

If you have any questions or comments about this advisory:

Affected configurations

Vulners
Node
pypiml-scannerRange<0pypi
CPENameOperatorVersion
pypi/flask-appbuilderlt0

2.7 Low

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

HIGH

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

LOW

Integrity Impact

NONE

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:N/A:N

0.001 Low

EPSS

Percentile

19.4%

Related for GITLAB-16E647FF7331994FDC4520C3143E5DCC