// For flags

CVE-2022-39322

@keystone-6/core vulnerable to field-level access-control bypass for multiselect field

Severity Score

9.8
*CVSS v3.1

Exploit Likelihood

*EPSS

Affected Versions

*CPE

Public Exploits

1
*Multiple Sources

Exploited in Wild

-
*KEV

Decision

-
*SSVC
Descriptions

@keystone-6/core is a core package for Keystone 6, a content management system for Node.js. Starting with version 2.2.0 and prior to version 2.3.1, users who expected their `multiselect` fields to use the field-level access control - if configured - are vulnerable to their field-level access control not being used. List-level access control is not affected. Field-level access control for fields other than `multiselect` are not affected. Version 2.3.1 contains a fix for this issue. As a workaround, stop using the `multiselect` field.

keystone-6/core es un paquete central para Keystone 6, un sistema de administración de contenidos para Node.js. A partir de versiones 2.2.0 anteriores a 2.3.1, los usuarios que esperaban que sus campos "multiselect" usaran el control de acceso a nivel de campo -si estaba configurado- son vulnerables a que su control de acceso a nivel de campo no sea usado. El control de acceso a nivel de lista no está afectado. El control de acceso a nivel de campo para los campos que no sean "multiselect" no está afectado. La versión 2.3.1 contiene una corrección para este problema. Como mitigación, deje de usar el campo "multiselect"

*Credits: N/A
CVSS Scores
Attack Vector
Network
Attack Complexity
Low
Privileges Required
None
User Interaction
None
Scope
Unchanged
Confidentiality
High
Integrity
High
Availability
High
Attack Vector
Network
Attack Complexity
Low
Privileges Required
None
User Interaction
None
Scope
Unchanged
Confidentiality
High
Integrity
High
Availability
None
* Common Vulnerability Scoring System
SSVC
  • Decision:-
Exploitation
-
Automatable
-
Tech. Impact
-
* Organization's Worst-case Scenario
Timeline
  • 2022-09-02 CVE Reserved
  • 2022-10-25 CVE Published
  • 2024-08-03 CVE Updated
  • 2024-08-03 First Exploit
  • 2024-10-09 EPSS Updated
  • ---------- Exploited in Wild
  • ---------- KEV Due Date
CWE
  • CWE-285: Improper Authorization
  • CWE-863: Incorrect Authorization
CAPEC
Affected Vendors, Products, and Versions
Vendor Product Version Other Status
Vendor Product Version Other Status <-- --> Vendor Product Version Other Status
Keystonejs
Search vendor "Keystonejs"
Keystone
Search vendor "Keystonejs" for product "Keystone"
>= 2.2.0 < 2.3.1
Search vendor "Keystonejs" for product "Keystone" and version " >= 2.2.0 < 2.3.1"
node.js
Affected