Логотип exploitDog
bind:CVE-2022-3589
Консоль
Логотип exploitDog

exploitDog

bind:CVE-2022-3589

Количество 2

Количество 2

nvd логотип

CVE-2022-3589

около 3 лет назад

An API Endpoint used by Miele's "AppWash" MobileApp in all versions was vulnerable to an authorization bypass. A low privileged, remote attacker would have been able to gain read and partial write access to other users data by modifying a small part of a HTTP request sent to the API. Reading or changing the password of another user was not possible, thus no impact to Availability.

CVSS3: 8.1
EPSS: Низкий
github логотип

GHSA-cj87-vv3f-mmxj

около 3 лет назад

An API Endpoint used by Miele's "AppWash" MobileApp in all versions was vulnerable to an authorization bypass. A low privileged, remote attacker would have been able to gain read and partial write access to other users data by modifying a small part of a HTTP request sent to the API. Reading or changing the password of another user was not possible, thus no impact to Availability.

CVSS3: 8.1
EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
nvd логотип
CVE-2022-3589

An API Endpoint used by Miele's "AppWash" MobileApp in all versions was vulnerable to an authorization bypass. A low privileged, remote attacker would have been able to gain read and partial write access to other users data by modifying a small part of a HTTP request sent to the API. Reading or changing the password of another user was not possible, thus no impact to Availability.

CVSS3: 8.1
0%
Низкий
около 3 лет назад
github логотип
GHSA-cj87-vv3f-mmxj

An API Endpoint used by Miele's "AppWash" MobileApp in all versions was vulnerable to an authorization bypass. A low privileged, remote attacker would have been able to gain read and partial write access to other users data by modifying a small part of a HTTP request sent to the API. Reading or changing the password of another user was not possible, thus no impact to Availability.

CVSS3: 8.1
0%
Низкий
около 3 лет назад

Уязвимостей на страницу