FKIE_CVE-2022-28795
Vulnerability from fkie_nvd - Published: 2022-04-12 17:15 - Updated: 2024-11-21 06:57
Severity ?
Summary
A vulnerability within the Avira Password Manager Browser Extensions provided a potential loophole where, if a user visited a page crafted by an attacker, the discovered vulnerability could trigger the Password Manager Extension to fill in the password field automatically. An attacker could then access this information via JavaScript. The issue was fixed with the browser extensions version 2.18.5 for Chrome, MS Edge, Opera, Firefox, and Safari.
References
Impacted products
| Vendor | Product | Version | |
|---|---|---|---|
| avira | password_manager | 2.18.4 | |
| avira | password_manager | 2.18.4.3847 | |
| avira | password_manager | 2.18.4.3847 | |
| avira | password_manager | 2.18.4.3868 | |
| avira | password_manager | 2.18.4.38471 |
{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:avira:password_manager:2.18.4:*:*:*:*:safari:*:*",
"matchCriteriaId": "036D4EFA-5735-4CDC-927E-FDAFFC20AD58",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:avira:password_manager:2.18.4.3847:*:*:*:*:edge:*:*",
"matchCriteriaId": "914F107C-0D3D-426A-803E-09F302F126FA",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:avira:password_manager:2.18.4.3847:*:*:*:*:opera:*:*",
"matchCriteriaId": "704A646E-ACD2-46D4-B380-8DD8BEE11FD9",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:avira:password_manager:2.18.4.3868:*:*:*:*:chrome:*:*",
"matchCriteriaId": "67A7F636-3C8C-48AD-965A-9F21A48FD607",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:avira:password_manager:2.18.4.38471:*:*:*:*:firefox:*:*",
"matchCriteriaId": "0804892E-24B4-4F8C-9E8B-1FE1FD899A2C",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A vulnerability within the Avira Password Manager Browser Extensions provided a potential loophole where, if a user visited a page crafted by an attacker, the discovered vulnerability could trigger the Password Manager Extension to fill in the password field automatically. An attacker could then access this information via JavaScript. The issue was fixed with the browser extensions version 2.18.5 for Chrome, MS Edge, Opera, Firefox, and Safari."
},
{
"lang": "es",
"value": "Una vulnerabilidad en las extensiones de navegador de Avira Password Manager ofrec\u00eda una posible laguna en la que, si un usuario visitaba una p\u00e1gina dise\u00f1ada por un atacante, la vulnerabilidad detectada pod\u00eda hacer que la extensi\u00f3n de Password Manager rellenara el campo de la contrase\u00f1a autom\u00e1ticamente. Un atacante podr\u00eda entonces acceder a esta informaci\u00f3n por medio de JavaScript. El problema ha sido corregido con la versi\u00f3n 2.18.5 de las extensiones del navegador para Chrome, MS Edge, Opera, Firefox y Safari"
}
],
"id": "CVE-2022-28795",
"lastModified": "2024-11-21T06:57:57.023",
"metrics": {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 4.3,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "NONE",
"vectorString": "AV:N/AC:M/Au:N/C:P/I:N/A:N",
"version": "2.0"
},
"exploitabilityScore": 8.6,
"impactScore": 2.9,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "nvd@nist.gov",
"type": "Primary",
"userInteractionRequired": true
}
],
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"exploitabilityScore": 2.8,
"impactScore": 3.6,
"source": "nvd@nist.gov",
"type": "Primary"
}
]
},
"published": "2022-04-12T17:15:10.940",
"references": [
{
"source": "security@nortonlifelock.com",
"tags": [
"Third Party Advisory"
],
"url": "https://support.norton.com/sp/static/external/tools/security-advisories.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
],
"url": "https://support.norton.com/sp/static/external/tools/security-advisories.html"
}
],
"sourceIdentifier": "security@nortonlifelock.com",
"vulnStatus": "Modified",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "NVD-CWE-noinfo"
}
],
"source": "nvd@nist.gov",
"type": "Primary"
}
]
}
Loading…
Loading…
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.
Loading…
Loading…