First published: Wed Apr 20 2022(Updated: )
An issue was discovered in MISP before 2.4.158. In UsersController.php, password confirmation can be bypassed via vectors involving an "Accept: application/json" header.
Credit: cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Misp Misp | <2.4.158 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID for this issue is CVE-2022-29534.
CVE-2022-29534 has a severity rating of 7.5 (high).
This vulnerability in MISP allows bypassing password confirmation via vectors involving an 'Accept: application/json' header.
MISP versions up to and excluding 2.4.158 are affected by CVE-2022-29534.
Yes, you can find references and additional information about CVE-2022-29534 in the following links: [Link 1](https://github.com/MISP/MISP/commit/01120163a6b4d905029d416e7305575df31df8af), [Link 2](https://github.com/MISP/MISP/compare/v2.4.157...v2.4.158), [Link 3](https://zigrin.com/cakephp-application-cybersecurity-research-the-impact-of-a-php-vulnerability-exploring-the-password-confirmation-bypass-in-misp/).