Lucene search

K
nvd[email protected]NVD:CVE-2022-24740
HistoryMar 14, 2022 - 11:15 p.m.

CVE-2022-24740

2022-03-1423:15:08
CWE-287
web.nvd.nist.gov
1

6 Medium

CVSS2

Attack Vector

NETWORK

Attack Complexity

MEDIUM

Authentication

SINGLE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:M/Au:S/C:P/I:P/A:P

7.5 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

HIGH

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H

0.001 Low

EPSS

Percentile

43.0%

Volto is a ReactJS-based frontend for the Plone Content Management System. Between versions 14.0.0-alpha.5 and 15.0.0-alpha.0, a user could have their authentication cookie replaced with an authentication cookie from another user, effectively giving them control of the other user’s account and privileges. This occurs when using an outdated version of the react-cookie library and a server is under high load. A proof of concept does not currently exist, but it is possible for this issue to occur in the wild. The patch and fix is present in Volto 15.0.0-alpha.0. As a workaround, one may manually upgrade the react-cookie package to 4.1.1 and then override all Volto components that use this library.

Affected configurations

NVD
Node
plonevoltoRange14.1.014.10.0node.js
OR
plonevoltoMatch14.0.0-node.js
OR
plonevoltoMatch14.0.0alpha10node.js
OR
plonevoltoMatch14.0.0alpha11node.js
OR
plonevoltoMatch14.0.0alpha12node.js
OR
plonevoltoMatch14.0.0alpha13node.js
OR
plonevoltoMatch14.0.0alpha14node.js
OR
plonevoltoMatch14.0.0alpha15node.js
OR
plonevoltoMatch14.0.0alpha16node.js
OR
plonevoltoMatch14.0.0alpha17node.js
OR
plonevoltoMatch14.0.0alpha18node.js
OR
plonevoltoMatch14.0.0alpha19node.js
OR
plonevoltoMatch14.0.0alpha20node.js
OR
plonevoltoMatch14.0.0alpha21node.js
OR
plonevoltoMatch14.0.0alpha22node.js
OR
plonevoltoMatch14.0.0alpha23node.js
OR
plonevoltoMatch14.0.0alpha24node.js
OR
plonevoltoMatch14.0.0alpha25node.js
OR
plonevoltoMatch14.0.0alpha26node.js
OR
plonevoltoMatch14.0.0alpha27node.js
OR
plonevoltoMatch14.0.0alpha28node.js
OR
plonevoltoMatch14.0.0alpha29node.js
OR
plonevoltoMatch14.0.0alpha30node.js
OR
plonevoltoMatch14.0.0alpha31node.js
OR
plonevoltoMatch14.0.0alpha32node.js
OR
plonevoltoMatch14.0.0alpha33node.js
OR
plonevoltoMatch14.0.0alpha34node.js
OR
plonevoltoMatch14.0.0alpha35node.js
OR
plonevoltoMatch14.0.0alpha36node.js
OR
plonevoltoMatch14.0.0alpha37node.js
OR
plonevoltoMatch14.0.0alpha38node.js
OR
plonevoltoMatch14.0.0alpha39node.js
OR
plonevoltoMatch14.0.0alpha40node.js
OR
plonevoltoMatch14.0.0alpha41node.js
OR
plonevoltoMatch14.0.0alpha42node.js
OR
plonevoltoMatch14.0.0alpha43node.js
OR
plonevoltoMatch14.0.0alpha6node.js
OR
plonevoltoMatch14.0.0alpha7node.js
OR
plonevoltoMatch14.0.0alpha8node.js
OR
plonevoltoMatch14.0.0alpha9node.js
OR
plonevoltoMatch15.0.0alpha0node.js

6 Medium

CVSS2

Attack Vector

NETWORK

Attack Complexity

MEDIUM

Authentication

SINGLE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:M/Au:S/C:P/I:P/A:P

7.5 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

HIGH

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H

0.001 Low

EPSS

Percentile

43.0%

Related for NVD:CVE-2022-24740