First published: Fri Sep 23 2022(Updated: )
A SQL injection vulnerability exists in Rocket.Chat <v3.18.6, <v4.4.4 and <v4.7.3 which can allow an attacker to retrieve a reset password token through or a 2fa secret.
Credit: support@hackerone.com
Affected Software | Affected Version | How to fix |
---|---|---|
Rocket.Chat Rocket.Chat | <3.18.6 | |
Rocket.Chat Rocket.Chat | >=4.0.0<4.4.4 | |
Rocket.Chat Rocket.Chat | >=4.7.0<4.7.3 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of CVE-2022-32211 is high, with a CVSS score of 8.8.
The SQL injection vulnerability allows the attacker to manipulate the input and execute arbitrary SQL queries, which can be used to extract the reset password token or a 2FA secret from the database.
Rocket.Chat versions <v3.18.6, <v4.4.4, and <v4.7.3 are affected by the SQL injection vulnerability.
To fix the SQL injection vulnerability, upgrade Rocket.Chat to version 3.18.6 or higher if you are on a version lower than 3.18.6, or upgrade to versions 4.4.4 or 4.7.3 or higher if you are on a version between 4.0.0 and 4.4.4 or between 4.7.0 and 4.7.3.
You can find more information about CVE-2022-32211 on the HackerOne report at the following link: [https://hackerone.com/reports/1581059](https://hackerone.com/reports/1581059).