Logo
-

Byte Open Security

(ByteOS Network)

Log In

Sign Up

ByteOS

Security
Vulnerability Details
Registries
Custom Views
Weaknesses
Attack Patterns
Filters & Tools
Vulnerability Details :

CVE-2022-29858

Summary
Assigner-mitre
Assigner Org ID-8254265b-2729-46b6-b9e3-3dfca2d5bfca
Published At-28 Jun, 2022 | 21:36
Updated At-03 Aug, 2024 | 06:33
Rejected At-
Credits

Silverstripe silverstripe/assets through 1.10 is vulnerable to improper access control that allows protected images to be published by changing an existing image short code on website content.

Vendors
-
Not available
Products
-
Metrics (CVSS)
VersionBase scoreBase severityVector
Weaknesses
Attack Patterns
Solution/Workaround
References
HyperlinkResource Type
EPSS History
Score
Latest Score
-
N/A
No data available for selected date range
Percentile
Latest Percentile
-
N/A
No data available for selected date range
Stakeholder-Specific Vulnerability Categorization (SSVC)
▼Common Vulnerabilities and Exposures (CVE)
cve.org
Assigner:mitre
Assigner Org ID:8254265b-2729-46b6-b9e3-3dfca2d5bfca
Published At:28 Jun, 2022 | 21:36
Updated At:03 Aug, 2024 | 06:33
Rejected At:
▼CVE Numbering Authority (CNA)

Silverstripe silverstripe/assets through 1.10 is vulnerable to improper access control that allows protected images to be published by changing an existing image short code on website content.

Affected Products
Vendor
n/a
Product
n/a
Versions
Affected
  • n/a
Problem Types
TypeCWE IDDescription
textN/An/a
Type: text
CWE ID: N/A
Description: n/a
Metrics
VersionBase scoreBase severityVector
Metrics Other Info
Impacts
CAPEC IDDescription
Solutions

Configurations

Workarounds

Exploits

Credits

Timeline
EventDate
Replaced By

Rejected Reason

References
HyperlinkResource
https://www.silverstripe.org/download/security-releases/
x_refsource_MISC
https://www.silverstripe.org/blog/tag/release
x_refsource_MISC
https://forum.silverstripe.org/c/releases
x_refsource_MISC
https://www.silverstripe.org/download/security-releases/cve-2022-29858
x_refsource_MISC
https://huntr.dev/bounties/90e17d95-9f2f-44eb-9f26-49fa13a41d5a/
x_refsource_MISC
https://github.com/silverstripe/silverstripe-assets/commit/5f6a73b010c01587ffbfb954441f6b7cbb54e767
x_refsource_MISC
Hyperlink: https://www.silverstripe.org/download/security-releases/
Resource:
x_refsource_MISC
Hyperlink: https://www.silverstripe.org/blog/tag/release
Resource:
x_refsource_MISC
Hyperlink: https://forum.silverstripe.org/c/releases
Resource:
x_refsource_MISC
Hyperlink: https://www.silverstripe.org/download/security-releases/cve-2022-29858
Resource:
x_refsource_MISC
Hyperlink: https://huntr.dev/bounties/90e17d95-9f2f-44eb-9f26-49fa13a41d5a/
Resource:
x_refsource_MISC
Hyperlink: https://github.com/silverstripe/silverstripe-assets/commit/5f6a73b010c01587ffbfb954441f6b7cbb54e767
Resource:
x_refsource_MISC
▼Authorized Data Publishers (ADP)
CVE Program Container
Affected Products
Metrics
VersionBase scoreBase severityVector
Metrics Other Info
Impacts
CAPEC IDDescription
Solutions

Configurations

Workarounds

Exploits

Credits

Timeline
EventDate
Replaced By

Rejected Reason

References
HyperlinkResource
https://www.silverstripe.org/download/security-releases/
x_refsource_MISC
x_transferred
https://www.silverstripe.org/blog/tag/release
x_refsource_MISC
x_transferred
https://forum.silverstripe.org/c/releases
x_refsource_MISC
x_transferred
https://www.silverstripe.org/download/security-releases/cve-2022-29858
x_refsource_MISC
x_transferred
https://huntr.dev/bounties/90e17d95-9f2f-44eb-9f26-49fa13a41d5a/
x_refsource_MISC
x_transferred
https://github.com/silverstripe/silverstripe-assets/commit/5f6a73b010c01587ffbfb954441f6b7cbb54e767
x_refsource_MISC
x_transferred
Hyperlink: https://www.silverstripe.org/download/security-releases/
Resource:
x_refsource_MISC
x_transferred
Hyperlink: https://www.silverstripe.org/blog/tag/release
Resource:
x_refsource_MISC
x_transferred
Hyperlink: https://forum.silverstripe.org/c/releases
Resource:
x_refsource_MISC
x_transferred
Hyperlink: https://www.silverstripe.org/download/security-releases/cve-2022-29858
Resource:
x_refsource_MISC
x_transferred
Hyperlink: https://huntr.dev/bounties/90e17d95-9f2f-44eb-9f26-49fa13a41d5a/
Resource:
x_refsource_MISC
x_transferred
Hyperlink: https://github.com/silverstripe/silverstripe-assets/commit/5f6a73b010c01587ffbfb954441f6b7cbb54e767
Resource:
x_refsource_MISC
x_transferred
Information is not available yet
▼National Vulnerability Database (NVD)
nvd.nist.gov
Source:cve@mitre.org
Published At:28 Jun, 2022 | 22:15
Updated At:08 Jul, 2022 | 01:08

Silverstripe silverstripe/assets through 1.10 is vulnerable to improper access control that allows protected images to be published by changing an existing image short code on website content.

CISA Catalog
Date AddedDue DateVulnerability NameRequired Action
N/A
Date Added: N/A
Due Date: N/A
Vulnerability Name: N/A
Required Action: N/A
Metrics
TypeVersionBase scoreBase severityVector
Primary3.14.3MEDIUM
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N
Primary2.04.0MEDIUM
AV:N/AC:L/Au:S/C:P/I:N/A:N
Type: Primary
Version: 3.1
Base score: 4.3
Base severity: MEDIUM
Vector:
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N
Type: Primary
Version: 2.0
Base score: 4.0
Base severity: MEDIUM
Vector:
AV:N/AC:L/Au:S/C:P/I:N/A:N
CPE Matches

Silverstripe
silverstripe
>>assets>>Versions before 1.10.1(exclusive)
cpe:2.3:a:silverstripe:assets:*:*:*:*:*:*:*:*
Weaknesses
CWE IDTypeSource
CWE-287Primarynvd@nist.gov
CWE ID: CWE-287
Type: Primary
Source: nvd@nist.gov
Evaluator Description

Evaluator Impact

Evaluator Solution

Vendor Statements

References
HyperlinkSourceResource
https://forum.silverstripe.org/c/releasescve@mitre.org
Release Notes
Vendor Advisory
https://github.com/silverstripe/silverstripe-assets/commit/5f6a73b010c01587ffbfb954441f6b7cbb54e767cve@mitre.org
Patch
Third Party Advisory
https://huntr.dev/bounties/90e17d95-9f2f-44eb-9f26-49fa13a41d5a/cve@mitre.org
Exploit
Third Party Advisory
https://www.silverstripe.org/blog/tag/releasecve@mitre.org
Release Notes
Vendor Advisory
https://www.silverstripe.org/download/security-releases/cve@mitre.org
Not Applicable
Vendor Advisory
https://www.silverstripe.org/download/security-releases/cve-2022-29858cve@mitre.org
Release Notes
Vendor Advisory
Hyperlink: https://forum.silverstripe.org/c/releases
Source: cve@mitre.org
Resource:
Release Notes
Vendor Advisory
Hyperlink: https://github.com/silverstripe/silverstripe-assets/commit/5f6a73b010c01587ffbfb954441f6b7cbb54e767
Source: cve@mitre.org
Resource:
Patch
Third Party Advisory
Hyperlink: https://huntr.dev/bounties/90e17d95-9f2f-44eb-9f26-49fa13a41d5a/
Source: cve@mitre.org
Resource:
Exploit
Third Party Advisory
Hyperlink: https://www.silverstripe.org/blog/tag/release
Source: cve@mitre.org
Resource:
Release Notes
Vendor Advisory
Hyperlink: https://www.silverstripe.org/download/security-releases/
Source: cve@mitre.org
Resource:
Not Applicable
Vendor Advisory
Hyperlink: https://www.silverstripe.org/download/security-releases/cve-2022-29858
Source: cve@mitre.org
Resource:
Release Notes
Vendor Advisory

Change History

0
Information is not available yet

Similar CVEs

60Records found

CVE-2022-21692
Matching Score-4
Assigner-GitHub, Inc.
ShareView Details
Matching Score-4
Assigner-GitHub, Inc.
CVSS Score-4.3||MEDIUM
EPSS-0.15% / 36.44%
||
7 Day CHG~0.00%
Published-18 Jan, 2022 | 22:10
Updated-22 Apr, 2025 | 18:33
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Improper Access Control in Onionshare

OnionShare is an open source tool that lets you securely and anonymously share files, host websites, and chat with friends using the Tor network. In affected versions anyone with access to the chat environment can write messages disguised as another chat participant.

Action-Not Available
Vendor-onionshareonionshare
Product-onionshareonionshare
CWE ID-CWE-287
Improper Authentication
CVE-2012-4457
Matching Score-4
Assigner-Red Hat, Inc.
ShareView Details
Matching Score-4
Assigner-Red Hat, Inc.
CVSS Score-4||MEDIUM
EPSS-0.56% / 67.30%
||
7 Day CHG~0.00%
Published-09 Oct, 2012 | 15:00
Updated-11 Apr, 2025 | 00:51
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

OpenStack Keystone Essex before 2012.1.2 and Folsom before folsom-3 does not properly handle authorization tokens for disabled tenants, which allows remote authenticated users to access the tenant's resources by requesting a token for the tenant.

Action-Not Available
Vendor-n/aOpenStack
Product-keystonen/a
CWE ID-CWE-287
Improper Authentication
CVE-2020-13303
Matching Score-4
Assigner-GitLab Inc.
ShareView Details
Matching Score-4
Assigner-GitLab Inc.
CVSS Score-7.1||HIGH
EPSS-0.14% / 34.96%
||
7 Day CHG~0.00%
Published-15 Sep, 2020 | 12:27
Updated-04 Aug, 2024 | 12:18
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

A vulnerability was discovered in GitLab versions before 13.1.10, 13.2.8 and 13.3.4. Due to improper verification of permissions, an unauthorized user can access a private repository within a public project.

Action-Not Available
Vendor-GitLab Inc.
Product-gitlabGitLab
CWE ID-CWE-287
Improper Authentication
CVE-2022-1067
Matching Score-4
Assigner-Cybersecurity and Infrastructure Security Agency (CISA) Industrial Control Systems (ICS)
ShareView Details
Matching Score-4
Assigner-Cybersecurity and Infrastructure Security Agency (CISA) Industrial Control Systems (ICS)
CVSS Score-6.5||MEDIUM
EPSS-0.14% / 34.80%
||
7 Day CHG~0.00%
Published-11 Apr, 2022 | 19:38
Updated-16 Apr, 2025 | 16:31
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
ICSMA-22-095-01 LifePoint Informatics Patient Portal

Navigating to a specific URL with a patient ID number will result in the server generating a PDF of a lab report without authentication and rate limiting.

Action-Not Available
Vendor-lifepointLifePoint Informatics
Product-patient_portalPatient Portal
CWE ID-CWE-288
Authentication Bypass Using an Alternate Path or Channel
CWE ID-CWE-287
Improper Authentication
CVE-2022-0996
Matching Score-4
Assigner-Red Hat, Inc.
ShareView Details
Matching Score-4
Assigner-Red Hat, Inc.
CVSS Score-6.5||MEDIUM
EPSS-0.09% / 25.90%
||
7 Day CHG~0.00%
Published-23 Mar, 2022 | 19:46
Updated-13 Feb, 2025 | 16:28
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

A vulnerability was found in the 389 Directory Server that allows expired passwords to access the database to cause improper authentication.

Action-Not Available
Vendor-n/aRed Hat, Inc.Fedora Project
Product-fedora389_directory_serverenterprise_linux389-ds-base
CWE ID-CWE-287
Improper Authentication
CVE-2020-10754
Matching Score-4
Assigner-Red Hat, Inc.
ShareView Details
Matching Score-4
Assigner-Red Hat, Inc.
CVSS Score-4.3||MEDIUM
EPSS-0.25% / 48.34%
||
7 Day CHG~0.00%
Published-08 Jun, 2020 | 17:16
Updated-04 Aug, 2024 | 11:14
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

It was found that nmcli, a command line interface to NetworkManager did not honour 802-1x.ca-path and 802-1x.phase2-ca-path settings, when creating a new profile. When a user connects to a network using this profile, the authentication does not happen and the connection is made insecurely.

Action-Not Available
Vendor-[Red Hat]The GNOME ProjectFedora Project
Product-networkmanagerfedoraNetworkManager
CWE ID-CWE-287
Improper Authentication
CWE ID-CWE-306
Missing Authentication for Critical Function
CVE-2023-3622
Matching Score-4
Assigner-SolarWinds
ShareView Details
Matching Score-4
Assigner-SolarWinds
CVSS Score-4.3||MEDIUM
EPSS-0.07% / 22.59%
||
7 Day CHG-0.00%
Published-26 Jul, 2023 | 14:45
Updated-02 Aug, 2024 | 07:01
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Access Control Bypass Vulnerability in the SolarWinds Platform

Access Control Bypass Vulnerability in the SolarWinds Platform that allows an underprivileged user to read arbitrary resource

Action-Not Available
Vendor-SolarWindsSolarWinds Worldwide, LLC.
Product-solarwinds_platformSolarWinds Platform
CWE ID-CWE-287
Improper Authentication
CVE-2020-27558
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-6.5||MEDIUM
EPSS-0.42% / 60.83%
||
7 Day CHG~0.00%
Published-17 Nov, 2020 | 14:17
Updated-04 Aug, 2024 | 16:18
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Use of an undocumented user in BASETech GE-131 BT-1837836 firmware 20180921 allows remote attackers to view the video stream.

Action-Not Available
Vendor-basetechn/a
Product-ge-131_bt-1837836_firmwarege-131_bt-1837836n/a
CWE ID-CWE-287
Improper Authentication
CVE-2021-20737
Matching Score-4
Assigner-JPCERT/CC
ShareView Details
Matching Score-4
Assigner-JPCERT/CC
CVSS Score-6.5||MEDIUM
EPSS-0.26% / 48.71%
||
7 Day CHG~0.00%
Published-22 Jun, 2021 | 01:35
Updated-03 Aug, 2024 | 17:53
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Improper authentication vulnerability in GROWI versions prior to v4.2.20 allows a remote attacker to view the unauthorized pages without access privileges via unspecified vectors.

Action-Not Available
Vendor-weseekWESEEK, Inc.
Product-growiGROWI
CWE ID-CWE-287
Improper Authentication
CVE-2020-8200
Matching Score-4
Assigner-HackerOne
ShareView Details
Matching Score-4
Assigner-HackerOne
CVSS Score-6.5||MEDIUM
EPSS-0.28% / 50.86%
||
7 Day CHG~0.00%
Published-18 Sep, 2020 | 20:13
Updated-04 Aug, 2024 | 09:56
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Improper authentication in Citrix StoreFront Server < 1912.0.1000 allows an attacker who is authenticated on the same Microsoft Active Directory domain as a Citrix StoreFront server to read arbitrary files from that server.

Action-Not Available
Vendor-n/aCitrix (Cloud Software Group, Inc.)
Product-storefront_serverCitrix StoreFront
CWE ID-CWE-287
Improper Authentication
  • Previous
  • 1
  • 2
  • Next
Details not found