CVE-2022-21683
CVSS V2 Medium 4
CVSS V3 Medium 4.3
Description
Wagtail is a Django based content management system focused on flexibility and user experience. When notifications for new replies in comment threads are sent, they are sent to all users who have replied or commented anywhere on the site, rather than only in the relevant threads. This means that a user could listen in to new comment replies on pages they have not have editing access to, as long as they have left a comment or reply somewhere on the site. A patched version has been released as Wagtail 2.15.2, which restores the intended behaviour - to send notifications for new replies to the participants in the active thread only (editing permissions are not considered). New comments can be disabled by setting `WAGTAILADMIN_COMMENTS_ENABLED = False` in the Django settings file.
Overview
- CVE ID
- CVE-2022-21683
- Assigner
- security-advisories@github.com
- Vulnerability Status
- Analyzed
- Published Version
- 2022-01-18T18:15:08
- Last Modified Date
- 2022-01-26T18:16:27
Weakness Enumerations
CPE Configuration (Product)
CPE | Vulnerable | Operator | Version Start | Version End |
---|---|---|---|---|
cpe:2.3:a:torchbox:wagtail:*:*:*:*:*:*:*:* | 1 | OR | 2.13 | 2.15.2 |
CVSS Version 2
- Version
- 2.0
- Vector String
- AV:N/AC:L/Au:S/C:P/I:N/A:N
- Access Vector
- NETWORK
- Access Compatibility
- LOW
- Authentication
- SINGLE
- Confidentiality Impact
- PARTIAL
- Integrity Impact
- NONE
- Availability Impact
- NONE
- Base Score
- 4
- Severity
- MEDIUM
- Exploitability Score
- 8
- Impact Score
- 2.9
CVSS Version 3
- Version
- 3.1
- Vector String
- CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N
- Attack Vector
- NETWORK
- Attack Compatibility
- LOW
- Privileges Required
- LOW
- User Interaction
- NONE
- Scope
- UNCHANGED
- Confidentiality Impact
- LOW
- Availability Impact
- NONE
- Base Score
- 4.3
- Base Severity
- MEDIUM
- Exploitability Score
- 2.8
- Impact Score
- 1.4
References
Reference URL | Reference Tags |
---|---|
https://github.com/wagtail/wagtail/commit/5fe901e5d86ed02dbbb63039a897582951266afd | Patch Third Party Advisory |
https://github.com/wagtail/wagtail/releases/tag/v2.15.2 | Release Notes Third Party Advisory |
https://github.com/wagtail/wagtail/security/advisories/GHSA-xqxm-2rpm-3889 | Mitigation Third Party Advisory |
Sources
Source Name | Source URL |
---|---|
NIST | https://nvd.nist.gov/vuln/detail/CVE-2022-21683 |
MITRE | https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21683 |
History
Created | Old Value | New Value | Data Type | Notes |
---|---|---|---|---|
2022-05-10 06:36:09 | Added to TrackCVE | |||
2022-12-06 06:56:06 | 2022-01-18T18:15Z | 2022-01-18T18:15:08 | CVE Published Date | updated |
2022-12-06 06:56:06 | 2022-01-26T18:16:27 | CVE Modified Date | updated | |
2022-12-06 06:56:06 | Analyzed | Vulnerability Status | updated |