CVE-2022-22691:
Umbraco Persistent Password Reset Poison
7.4
CVSS Score
3.1
Basic Information
CVE ID
GHSA ID
EPSS Score
0.55318%
CWE
Published
1/21/2022
Updated
2/3/2023
KEV Status
No
Technology
C#
Technical Details
CVSS Vector
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:N/A:N
Package Name | Ecosystem | Vulnerable Versions | First Patched Version |
---|---|---|---|
Umbraco.Cms.Core | nuget | < 9.2.0 | 9.2.0 |
Vulnerability Intelligence
Miggo AI
Root Cause Analysis
The vulnerability chain involves three key functions: 1) GetApplicationUrlFromCurrentRequest
directly uses the untrusted Host header to build URLs. 2) EnsureApplicationMainUrl
persists this value system-wide. 3) ConstructCallbackUrl
uses the poisoned URL to generate reset links. The advisory's code snippets and attack flow analysis explicitly reference these functions' roles in the exploit chain. The first two functions enable persistent poisoning (CVE-2022-22690), while the third enables token leakage (CVE-2022-22691).