Tooljet v1.6 does not properly handle missing values in the API, allowing attackers to arbitrarily reset passwords via a crafted HTTP request.
References
Link | Resource |
---|---|
http://tooljet.com | Product |
https://github.com/fourcube/security-advisories/blob/main/security-advisories/20220320-tooljet.md | Exploit |
Configurations
History
04 May 2023, 18:47
Type | Values Removed | Values Added |
---|---|---|
CPE | cpe:2.3:a:tooljet:tooljet:1.6:*:*:*:*:*:*:* | |
First Time |
Tooljet
Tooljet tooljet |
|
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 7.5 |
References | (MISC) http://tooljet.com - Product | |
References | (MISC) https://github.com/fourcube/security-advisories/blob/main/security-advisories/20220320-tooljet.md - Exploit | |
CWE | CWE-755 |
26 Apr 2023, 17:49
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2023-04-26 16:15
Updated : 2023-12-10 15:01
NVD link : CVE-2022-27978
Mitre link : CVE-2022-27978
CVE.ORG link : CVE-2022-27978
JSON object : View
Products Affected
tooljet
- tooljet
CWE
CWE-755
Improper Handling of Exceptional Conditions