CVE-2022-37109
moderate-risk
Published 2022-11-14
patrickfuller camp up to and including commit bbd53a256ed70e79bd8758080936afbf6d738767 is vulnerable to Incorrect Access Control. Access to the password.txt file is not properly restricted as it is in the root directory served by StaticFileHandler and the Tornado rule to throw a 403 error when password.txt is accessed can be bypassed. Furthermore, it is not necessary to crack the password hash to authenticate with the application because the password hash is also used as the cookie secret, so an attacker can generate his own authentication cookie.
Do I need to act?
~
2.5% chance of exploitation in next 30 days
EPSS score — moderate exploit probability
-
Not on CISA KEV list
No confirmed active exploitation reported to CISA
!
1 public exploit available
+
Fix available
Upgrade to: bf6af5c2e5cf713e4050c11c52dd4c55e89880b1, bf6af5c2e5cf713e4050c11c52dd4c55e89880b1
9
CVSS 9.8/10
Critical
NETWORK
/ LOW complexity
Affected Products (1)
Camp
Affected Vendors
References (8)
Third Party Advisory
https://github.com/ehtec/camp-exploit
Third Party Advisory
https://github.com/ehtec/camp-exploit
43
/ 100
moderate-risk
Severity
32/34 · Critical
Exploitability
6/34 · Minimal
Exposure
5/34 · Minimal