CVE-2022-28795 (GCVE-0-2022-28795)
Vulnerability from cvelistv5 – Published: 2022-04-12 16:11 – Updated: 2024-08-03 06:03
VLAI?
Summary
A vulnerability within the Avira Password Manager Browser Extensions provided a potential loophole where, if a user visited a page crafted by an attacker, the discovered vulnerability could trigger the Password Manager Extension to fill in the password field automatically. An attacker could then access this information via JavaScript. The issue was fixed with the browser extensions version 2.18.5 for Chrome, MS Edge, Opera, Firefox, and Safari.
Severity ?
No CVSS data available.
CWE
- Sensitive Data Leakage
Assigner
References
| URL | Tags | ||||
|---|---|---|---|---|---|
|
|||||
Impacted products
| Vendor | Product | Version | ||
|---|---|---|---|---|
| n/a | Avira Password Manager – Browser Extensions |
Affected:
Avira Password Manager - extension for Chrome
Affected: version 2.18.4.3868 Avira Password Manager - extension for MS Edge Affected: version 2.18.4.3847 Avira Password Manager - extension for Opera Affected: version 2.18.4.3847 Avira Password Manager - extension for Firefox Affected: version 2.18.4.38471 Avira Password Manager - extension for Safari Affected: version 2.18.4 |
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-03T06:03:52.992Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"tags": [
"x_refsource_MISC",
"x_transferred"
],
"url": "https://support.norton.com/sp/static/external/tools/security-advisories.html"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "Avira Password Manager \u2013 Browser Extensions",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "Avira Password Manager - extension for Chrome"
},
{
"status": "affected",
"version": "version 2.18.4.3868 Avira Password Manager - extension for MS Edge"
},
{
"status": "affected",
"version": "version 2.18.4.3847 Avira Password Manager - extension for Opera"
},
{
"status": "affected",
"version": "version 2.18.4.3847 Avira Password Manager - extension for Firefox"
},
{
"status": "affected",
"version": "version 2.18.4.38471 Avira Password Manager - extension for Safari"
},
{
"status": "affected",
"version": "version 2.18.4"
}
]
}
],
"descriptions": [
{
"lang": "en",
"value": "A vulnerability within the Avira Password Manager Browser Extensions provided a potential loophole where, if a user visited a page crafted by an attacker, the discovered vulnerability could trigger the Password Manager Extension to fill in the password field automatically. An attacker could then access this information via JavaScript. The issue was fixed with the browser extensions version 2.18.5 for Chrome, MS Edge, Opera, Firefox, and Safari."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "Sensitive Data Leakage",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2022-04-12T16:11:34",
"orgId": "dbd8429d-f261-4b1e-94cc-ae3132817e2e",
"shortName": "NLOK"
},
"references": [
{
"tags": [
"x_refsource_MISC"
],
"url": "https://support.norton.com/sp/static/external/tools/security-advisories.html"
}
],
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "security@nortonlifelock.com",
"ID": "CVE-2022-28795",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "Avira Password Manager \u2013 Browser Extensions",
"version": {
"version_data": [
{
"version_value": "Avira Password Manager - extension for Chrome"
},
{
"version_value": "version 2.18.4.3868 Avira Password Manager - extension for MS Edge"
},
{
"version_value": "version 2.18.4.3847 Avira Password Manager - extension for Opera"
},
{
"version_value": "version 2.18.4.3847 Avira Password Manager - extension for Firefox"
},
{
"version_value": "version 2.18.4.38471 Avira Password Manager - extension for Safari"
},
{
"version_value": "version 2.18.4"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "A vulnerability within the Avira Password Manager Browser Extensions provided a potential loophole where, if a user visited a page crafted by an attacker, the discovered vulnerability could trigger the Password Manager Extension to fill in the password field automatically. An attacker could then access this information via JavaScript. The issue was fixed with the browser extensions version 2.18.5 for Chrome, MS Edge, Opera, Firefox, and Safari."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "Sensitive Data Leakage"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "https://support.norton.com/sp/static/external/tools/security-advisories.html",
"refsource": "MISC",
"url": "https://support.norton.com/sp/static/external/tools/security-advisories.html"
}
]
}
}
}
},
"cveMetadata": {
"assignerOrgId": "dbd8429d-f261-4b1e-94cc-ae3132817e2e",
"assignerShortName": "NLOK",
"cveId": "CVE-2022-28795",
"datePublished": "2022-04-12T16:11:34",
"dateReserved": "2022-04-07T00:00:00",
"dateUpdated": "2024-08-03T06:03:52.992Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1",
"vulnerability-lookup:meta": {
"fkie_nvd": {
"configurations": "[{\"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:avira:password_manager:2.18.4:*:*:*:*:safari:*:*\", \"matchCriteriaId\": \"036D4EFA-5735-4CDC-927E-FDAFFC20AD58\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:avira:password_manager:2.18.4.3847:*:*:*:*:edge:*:*\", \"matchCriteriaId\": \"914F107C-0D3D-426A-803E-09F302F126FA\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:avira:password_manager:2.18.4.3847:*:*:*:*:opera:*:*\", \"matchCriteriaId\": \"704A646E-ACD2-46D4-B380-8DD8BEE11FD9\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:avira:password_manager:2.18.4.3868:*:*:*:*:chrome:*:*\", \"matchCriteriaId\": \"67A7F636-3C8C-48AD-965A-9F21A48FD607\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:avira:password_manager:2.18.4.38471:*:*:*:*:firefox:*:*\", \"matchCriteriaId\": \"0804892E-24B4-4F8C-9E8B-1FE1FD899A2C\"}]}]}]",
"descriptions": "[{\"lang\": \"en\", \"value\": \"A vulnerability within the Avira Password Manager Browser Extensions provided a potential loophole where, if a user visited a page crafted by an attacker, the discovered vulnerability could trigger the Password Manager Extension to fill in the password field automatically. An attacker could then access this information via JavaScript. The issue was fixed with the browser extensions version 2.18.5 for Chrome, MS Edge, Opera, Firefox, and Safari.\"}, {\"lang\": \"es\", \"value\": \"Una vulnerabilidad en las extensiones de navegador de Avira Password Manager ofrec\\u00eda una posible laguna en la que, si un usuario visitaba una p\\u00e1gina dise\\u00f1ada por un atacante, la vulnerabilidad detectada pod\\u00eda hacer que la extensi\\u00f3n de Password Manager rellenara el campo de la contrase\\u00f1a autom\\u00e1ticamente. Un atacante podr\\u00eda entonces acceder a esta informaci\\u00f3n por medio de JavaScript. El problema ha sido corregido con la versi\\u00f3n 2.18.5 de las extensiones del navegador para Chrome, MS Edge, Opera, Firefox y Safari\"}]",
"id": "CVE-2022-28795",
"lastModified": "2024-11-21T06:57:57.023",
"metrics": "{\"cvssMetricV31\": [{\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"cvssData\": {\"version\": \"3.1\", \"vectorString\": \"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N\", \"baseScore\": 6.5, \"baseSeverity\": \"MEDIUM\", \"attackVector\": \"NETWORK\", \"attackComplexity\": \"LOW\", \"privilegesRequired\": \"NONE\", \"userInteraction\": \"REQUIRED\", \"scope\": \"UNCHANGED\", \"confidentialityImpact\": \"HIGH\", \"integrityImpact\": \"NONE\", \"availabilityImpact\": \"NONE\"}, \"exploitabilityScore\": 2.8, \"impactScore\": 3.6}], \"cvssMetricV2\": [{\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"cvssData\": {\"version\": \"2.0\", \"vectorString\": \"AV:N/AC:M/Au:N/C:P/I:N/A:N\", \"baseScore\": 4.3, \"accessVector\": \"NETWORK\", \"accessComplexity\": \"MEDIUM\", \"authentication\": \"NONE\", \"confidentialityImpact\": \"PARTIAL\", \"integrityImpact\": \"NONE\", \"availabilityImpact\": \"NONE\"}, \"baseSeverity\": \"MEDIUM\", \"exploitabilityScore\": 8.6, \"impactScore\": 2.9, \"acInsufInfo\": false, \"obtainAllPrivilege\": false, \"obtainUserPrivilege\": false, \"obtainOtherPrivilege\": false, \"userInteractionRequired\": true}]}",
"published": "2022-04-12T17:15:10.940",
"references": "[{\"url\": \"https://support.norton.com/sp/static/external/tools/security-advisories.html\", \"source\": \"security@nortonlifelock.com\", \"tags\": [\"Third Party Advisory\"]}, {\"url\": \"https://support.norton.com/sp/static/external/tools/security-advisories.html\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Third Party Advisory\"]}]",
"sourceIdentifier": "security@nortonlifelock.com",
"vulnStatus": "Modified",
"weaknesses": "[{\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"description\": [{\"lang\": \"en\", \"value\": \"NVD-CWE-noinfo\"}]}]"
},
"nvd": "{\"cve\":{\"id\":\"CVE-2022-28795\",\"sourceIdentifier\":\"security@nortonlifelock.com\",\"published\":\"2022-04-12T17:15:10.940\",\"lastModified\":\"2024-11-21T06:57:57.023\",\"vulnStatus\":\"Modified\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"A vulnerability within the Avira Password Manager Browser Extensions provided a potential loophole where, if a user visited a page crafted by an attacker, the discovered vulnerability could trigger the Password Manager Extension to fill in the password field automatically. An attacker could then access this information via JavaScript. The issue was fixed with the browser extensions version 2.18.5 for Chrome, MS Edge, Opera, Firefox, and Safari.\"},{\"lang\":\"es\",\"value\":\"Una vulnerabilidad en las extensiones de navegador de Avira Password Manager ofrec\u00eda una posible laguna en la que, si un usuario visitaba una p\u00e1gina dise\u00f1ada por un atacante, la vulnerabilidad detectada pod\u00eda hacer que la extensi\u00f3n de Password Manager rellenara el campo de la contrase\u00f1a autom\u00e1ticamente. Un atacante podr\u00eda entonces acceder a esta informaci\u00f3n por medio de JavaScript. El problema ha sido corregido con la versi\u00f3n 2.18.5 de las extensiones del navegador para Chrome, MS Edge, Opera, Firefox y Safari\"}],\"metrics\":{\"cvssMetricV31\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N\",\"baseScore\":6.5,\"baseSeverity\":\"MEDIUM\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"NONE\",\"userInteraction\":\"REQUIRED\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"HIGH\",\"integrityImpact\":\"NONE\",\"availabilityImpact\":\"NONE\"},\"exploitabilityScore\":2.8,\"impactScore\":3.6}],\"cvssMetricV2\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"2.0\",\"vectorString\":\"AV:N/AC:M/Au:N/C:P/I:N/A:N\",\"baseScore\":4.3,\"accessVector\":\"NETWORK\",\"accessComplexity\":\"MEDIUM\",\"authentication\":\"NONE\",\"confidentialityImpact\":\"PARTIAL\",\"integrityImpact\":\"NONE\",\"availabilityImpact\":\"NONE\"},\"baseSeverity\":\"MEDIUM\",\"exploitabilityScore\":8.6,\"impactScore\":2.9,\"acInsufInfo\":false,\"obtainAllPrivilege\":false,\"obtainUserPrivilege\":false,\"obtainOtherPrivilege\":false,\"userInteractionRequired\":true}]},\"weaknesses\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"NVD-CWE-noinfo\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:avira:password_manager:2.18.4:*:*:*:*:safari:*:*\",\"matchCriteriaId\":\"036D4EFA-5735-4CDC-927E-FDAFFC20AD58\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:avira:password_manager:2.18.4.3847:*:*:*:*:edge:*:*\",\"matchCriteriaId\":\"914F107C-0D3D-426A-803E-09F302F126FA\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:avira:password_manager:2.18.4.3847:*:*:*:*:opera:*:*\",\"matchCriteriaId\":\"704A646E-ACD2-46D4-B380-8DD8BEE11FD9\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:avira:password_manager:2.18.4.3868:*:*:*:*:chrome:*:*\",\"matchCriteriaId\":\"67A7F636-3C8C-48AD-965A-9F21A48FD607\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:avira:password_manager:2.18.4.38471:*:*:*:*:firefox:*:*\",\"matchCriteriaId\":\"0804892E-24B4-4F8C-9E8B-1FE1FD899A2C\"}]}]}],\"references\":[{\"url\":\"https://support.norton.com/sp/static/external/tools/security-advisories.html\",\"source\":\"security@nortonlifelock.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://support.norton.com/sp/static/external/tools/security-advisories.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]}]}}"
}
}
Loading…
Loading…
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.
Loading…
Loading…