CVE-2022-21683
Comment reply notifications sent to incorrect users in wagtail
Severity Score
Exploit Likelihood
Affected Versions
Public Exploits
0Exploited in Wild
-Decision
Descriptions
Wagtail is a Django based content management system focused on flexibility and user experience. When notifications for new replies in comment threads are sent, they are sent to all users who have replied or commented anywhere on the site, rather than only in the relevant threads. This means that a user could listen in to new comment replies on pages they have not have editing access to, as long as they have left a comment or reply somewhere on the site. A patched version has been released as Wagtail 2.15.2, which restores the intended behaviour - to send notifications for new replies to the participants in the active thread only (editing permissions are not considered). New comments can be disabled by setting `WAGTAILADMIN_COMMENTS_ENABLED = False` in the Django settings file.
Wagtail es un sistema de administración de contenidos basado en Django y centrado en la flexibilidad y la experiencia del usuario. Cuando son enviadas notificaciones de nuevas respuestas en los hilos de comentarios, son enviados a todos los usuarios que han respondido o comentado en cualquier parte del sitio, en lugar de hacerlo sólo en los hilos correspondientes. Esto significa que un usuario puede escuchar las respuestas a nuevos comentarios en páginas a las que no presenta acceso de edición, siempre que haya dejado un comentario o respuesta en algún lugar del sitio. Ha sido publicada una versión parcheada como Wagtail 2.15.2, que restablece el comportamiento previsto: enviar notificaciones de nuevas respuestas sólo a participantes en el hilo activo (no es tomado en cuenta los permisos de edición). Los nuevos comentarios pueden deshabilitarse al establecer "WAGTAILADMIN_COMMENTS_ENABLED = False" en el archivo de configuración de Django
CVSS Scores
SSVC
- Decision:-
Timeline
- 2021-11-16 CVE Reserved
- 2022-01-18 CVE Published
- 2023-08-11 EPSS Updated
- 2024-08-03 CVE Updated
- ---------- Exploited in Wild
- ---------- KEV Due Date
- ---------- First Exploit
CWE
- CWE-200: Exposure of Sensitive Information to an Unauthorized Actor
CAPEC
References (3)
URL | Tag | Source |
---|---|---|
https://github.com/wagtail/wagtail/releases/tag/v2.15.2 | Release Notes | |
https://github.com/wagtail/wagtail/security/advisories/GHSA-xqxm-2rpm-3889 | Mitigation |
URL | Date | SRC |
---|
URL | Date | SRC |
---|---|---|
https://github.com/wagtail/wagtail/commit/5fe901e5d86ed02dbbb63039a897582951266afd | 2022-01-26 |
URL | Date | SRC |
---|
Affected Vendors, Products, and Versions
Vendor | Product | Version | Other | Status | ||||||
---|---|---|---|---|---|---|---|---|---|---|
Vendor | Product | Version | Other | Status | <-- --> | Vendor | Product | Version | Other | Status |
Torchbox Search vendor "Torchbox" | Wagtail Search vendor "Torchbox" for product "Wagtail" | >= 2.13 < 2.15.2 Search vendor "Torchbox" for product "Wagtail" and version " >= 2.13 < 2.15.2" | - |
Affected
|