Show plain JSON{"containers": {"cna": {"affected": [{"product": "Apache JSPWiki", "vendor": "Apache Software Foundation", "versions": [{"lessThanOrEqual": "Apache JSPWiki up to 2.11.2", "status": "affected", "version": "Apache JSPWiki", "versionType": "custom"}]}], "credits": [{"lang": "en", "value": "This issue was discovered by Fabrice Perez, <fabioperez AT gmail DOT com> "}], "descriptions": [{"lang": "en", "value": "A carefully crafted request on UserPreferences.jsp could trigger an CSRF vulnerability on Apache JSPWiki before 2.11.3, which could allow the attacker to modify the email associated with the attacked account, and then a reset password request from the login page."}], "metrics": [{"other": {"content": {"other": "critical"}, "type": "unknown"}}], "problemTypes": [{"descriptions": [{"description": "CSRF Account Takeover", "lang": "en", "type": "text"}]}], "providerMetadata": {"dateUpdated": "2022-08-04T06:15:43", "orgId": "f0158376-9dc2-43b6-827c-5f631a4d8d09", "shortName": "apache"}, "references": [{"tags": ["x_refsource_MISC"], "url": "https://jspwiki-wiki.apache.org/Wiki.jsp?page=CVE-2022-28732"}], "source": {"discovery": "UNKNOWN"}, "title": "Apache JSPWiki CSRF in UserPreferences.jsp", "workarounds": [{"lang": "en", "value": "Apache JSPWiki users should upgrade to 2.11.3 or later. Installations >= 2.7.0 can also enable user management workflows' manual approval to mitigate the issue. "}], "x_generator": {"engine": "Vulnogram 0.0.9"}, "x_legacyV4Record": {"CVE_data_meta": {"ASSIGNER": "security@apache.org", "ID": "CVE-2022-28731", "STATE": "PUBLIC", "TITLE": "Apache JSPWiki CSRF in UserPreferences.jsp"}, "affects": {"vendor": {"vendor_data": [{"product": {"product_data": [{"product_name": "Apache JSPWiki", "version": {"version_data": [{"version_affected": "<=", "version_name": "Apache JSPWiki", "version_value": "Apache JSPWiki up to 2.11.2"}]}}]}, "vendor_name": "Apache Software Foundation"}]}}, "credit": [{"lang": "eng", "value": "This issue was discovered by Fabrice Perez, <fabioperez AT gmail DOT com> "}], "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": {"description_data": [{"lang": "eng", "value": "A carefully crafted request on UserPreferences.jsp could trigger an CSRF vulnerability on Apache JSPWiki before 2.11.3, which could allow the attacker to modify the email associated with the attacked account, and then a reset password request from the login page."}]}, "generator": {"engine": "Vulnogram 0.0.9"}, "impact": [{"other": "critical"}], "problemtype": {"problemtype_data": [{"description": [{"lang": "eng", "value": "CSRF Account Takeover"}]}]}, "references": {"reference_data": [{"name": "https://jspwiki-wiki.apache.org/Wiki.jsp?page=CVE-2022-28732", "refsource": "MISC", "url": "https://jspwiki-wiki.apache.org/Wiki.jsp?page=CVE-2022-28732"}]}, "source": {"discovery": "UNKNOWN"}, "work_around": [{"lang": "en", "value": "Apache JSPWiki users should upgrade to 2.11.3 or later. Installations >= 2.7.0 can also enable user management workflows' manual approval to mitigate the issue. "}]}}, "adp": [{"providerMetadata": {"orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE", "dateUpdated": "2024-08-03T06:03:52.648Z"}, "title": "CVE Program Container", "references": [{"tags": ["x_refsource_MISC", "x_transferred"], "url": "https://jspwiki-wiki.apache.org/Wiki.jsp?page=CVE-2022-28732"}]}]}, "cveMetadata": {"assignerOrgId": "f0158376-9dc2-43b6-827c-5f631a4d8d09", "assignerShortName": "apache", "cveId": "CVE-2022-28731", "datePublished": "2022-08-04T06:15:43", "dateReserved": "2022-04-05T00:00:00", "dateUpdated": "2024-08-03T06:03:52.648Z", "state": "PUBLISHED"}, "dataType": "CVE_RECORD", "dataVersion": "5.1"}