// For flags

CVE-2022-32219

 

Severity Score

4.3
*CVSS v3.1

Exploit Likelihood

*EPSS

Affected Versions

*CPE

Public Exploits

1
*Multiple Sources

Exploited in Wild

-
*KEV

Decision

-
*SSVC
Descriptions

An information disclosure vulnerability exists in Rocket.Chat <v4.7.5 which allowed the "users.list" REST endpoint gets a query parameter from JSON and runs Users.find(queryFromClientSide). This means virtually any authenticated user can access any data (except password hashes) of any user authenticated.

Se presenta una vulnerabilidad de divulgación de información en Rocket.Chat versiones anteriores a v4.7.5 que permitía que el endpoint REST "users.list" obtuviera un parámetro de consulta de JSON y ejecutara Users.find(queryFromClientSide). Esto significa que prácticamente cualquier usuario autenticado puede acceder a cualquier dato (excepto los hashes de las contraseñas) de cualquier usuario autenticado.

*Credits: N/A
CVSS Scores
Attack Vector
Network
Attack Complexity
Low
Privileges Required
Low
User Interaction
None
Scope
Unchanged
Confidentiality
Low
Integrity
None
Availability
None
* Common Vulnerability Scoring System
SSVC
  • Decision:-
Exploitation
-
Automatable
-
Tech. Impact
-
* Organization's Worst-case Scenario
Timeline
  • 2022-06-01 CVE Reserved
  • 2022-09-23 CVE Published
  • 2024-04-15 EPSS Updated
  • 2024-08-03 CVE Updated
  • 2024-08-03 First Exploit
  • ---------- Exploited in Wild
  • ---------- KEV Due Date
CWE
  • CWE-200: Exposure of Sensitive Information to an Unauthorized Actor
CAPEC
References (1)
URL Tag Source
URL Date SRC
https://hackerone.com/reports/1140631 2024-08-03
URL Date SRC
URL Date SRC
Affected Vendors, Products, and Versions
Vendor Product Version Other Status
Vendor Product Version Other Status <-- --> Vendor Product Version Other Status
Rocket.chat
Search vendor "Rocket.chat"
Rocket.chat
Search vendor "Rocket.chat" for product "Rocket.chat"
< 4.7.5
Search vendor "Rocket.chat" for product "Rocket.chat" and version " < 4.7.5"
-
Affected