Logo
-

Byte Open Security

(ByteOS Network)

Log In

Sign Up

ByteOS

Security
Vulnerability Details
Registries
Custom Views
Weaknesses
Attack Patterns
Filters & Tools
NVD Vulnerability Details :
CVE-2022-23079
Modified
More InfoOfficial Page
Source-vulnerabilitylab@mend.io
View Known Exploited Vulnerability (KEV) details
Published At-22 Jun, 2022 | 13:15
Updated At-07 Nov, 2023 | 03:44

In motor-admin versions 0.0.1 through 0.2.56 are vulnerable to host header injection in the password reset functionality where malicious actor can send fake password reset email to arbitrary victim.

CISA Catalog
Date AddedDue DateVulnerability NameRequired Action
N/A
Date Added: N/A
Due Date: N/A
Vulnerability Name: N/A
Required Action: N/A
Metrics
TypeVersionBase scoreBase severityVector
Primary2.06.8MEDIUM
AV:N/AC:M/Au:N/C:P/I:P/A:P
Type: Primary
Version: 2.0
Base score: 6.8
Base severity: MEDIUM
Vector:
AV:N/AC:M/Au:N/C:P/I:P/A:P
CPE Matches

getmotoradmin
getmotoradmin
>>motor_admin>>Versions from 0.0.1(inclusive) to 0.2.56(inclusive)
cpe:2.3:a:getmotoradmin:motor_admin:*:*:*:*:*:*:*:*
Weaknesses
CWE IDTypeSource
CWE-116Primaryvulnerabilitylab@mend.io
CWE ID: CWE-116
Type: Primary
Source: vulnerabilitylab@mend.io
Evaluator Description

Evaluator Impact

Evaluator Solution

Vendor Statements

References
HyperlinkSourceResource
https://github.com/motor-admin/motor-admin/commit/a461b7507940a1fa062836daa89c82404fe3ecf9vulnerabilitylab@mend.io
Patch
Third Party Advisory
https://www.mend.io/vulnerability-database/CVE-2022-23079vulnerabilitylab@mend.io
Exploit
Third Party Advisory
Hyperlink: https://github.com/motor-admin/motor-admin/commit/a461b7507940a1fa062836daa89c82404fe3ecf9
Source: vulnerabilitylab@mend.io
Resource:
Patch
Third Party Advisory
Hyperlink: https://www.mend.io/vulnerability-database/CVE-2022-23079
Source: vulnerabilitylab@mend.io
Resource:
Exploit
Third Party Advisory
Change History
0Changes found

Details not found