CVE-2022-23067

Source
https://nvd.nist.gov/vuln/detail/CVE-2022-23067
Import Source
https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2022-23067.json
JSON Data
https://api.osv.dev/v1/vulns/CVE-2022-23067
Published
2022-05-18T14:15:08Z
Modified
2025-01-15T02:18:17.439864Z
Summary
[none]
Details

ToolJet versions v0.5.0 to v1.2.2 are vulnerable to token leakage via Referer header that leads to account takeover . If the user opens the invite link/signup link and then clicks on any external links within the page, it leaks the password set token/signup token in the referer header. Using these tokens the attacker can access the user’s account.

References

Affected packages

Git / github.com/tooljet/tooljet

Affected ranges

Type
GIT
Repo
https://github.com/tooljet/tooljet
Events
Introduced
0 Unknown introduced commit / All previous commits are affected
Fixed
Fixed

Affected versions

Other

bump-version
fix-csp
fix-dyn-vars
fix-ec2
fix-image
fix-k8s
fix-mongo
fix-pg-queries
fix-setup
fix-webpack

v0.*

v0.10.0
v0.10.0-hotfix.1
v0.10.1
v0.10.1-hotfix.1
v0.11.0
v0.12.0
v0.12.1
v0.12.2
v0.12.3
v0.13.0
v0.13.1
v0.13.2
v0.13.3
v0.13.4
v0.13.6
v0.5.0
v0.5.1
v0.5.10
v0.5.11
v0.5.12
v0.5.13
v0.5.14
v0.5.2
v0.5.3
v0.5.4
v0.5.5
v0.5.6
v0.5.7
v0.5.8
v0.5.9
v0.6.0
v0.6.1
v0.7.0
v0.7.1
v0.7.2
v0.7.3
v0.7.4
v0.8.0
v0.8.1
v0.8.1-ee.1.0.0
v0.9.0
v0.9.1
v0.9.2
v0.9.3
v0.9.3-hotfix.2

v1.*

v1.0
v1.0.1
v1.1.0
v1.2.0
v1.2.1
v1.2.2