Miggo Logo

CVE-2022-29238: Token bruteforcing.

4.3

CVSS Score
3.1

Basic Information

EPSS Score
0.47672%
Published
6/16/2022
Updated
1/27/2023
KEV Status
No
Technology
TechnologyPython

Technical Details

CVSS Vector
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N
Package NameEcosystemVulnerable VersionsFirst Patched Version
notebookpip< 6.4.126.4.12

Vulnerability Intelligence
Miggo AIMiggo AI

Miggo AIRoot Cause Analysis

The vulnerability stems from missing hidden file checks in file access methods despite allow_hidden=False. The workaround guidance explicitly mentions adding self.is_hidden(path) checks in ContentsManager methods, indicating these functions lacked proper authorization checks. The get() method handles file retrieval while _get_os_path() handles path resolution - both critical points where hidden file validation should occur. The high confidence comes from the advisory's direct implication of missing is_hidden checks in file access flows.

Vulnerable functions

Only Mi**o us*rs **n s** t*is s**tion

WAF Protection Rules

WAF Rule

### Imp**t _W**t kin* o* vuln*r**ility is it? W*o is imp**t**?_ *ut**nti**t** r*qu*sts to t** not**ook s*rv*r wit* `*ont*ntsM*n***r.*llow_*i***n = **ls*` only pr*v*nt** listin* t** *ont*nts o* *i***n *ir**tori*s, not ****ssin* in*ivi*u*l *i***n *il*

Reasoning

T** vuln*r**ility st*ms *rom missin* *i***n *il* ****ks in *il* ****ss m*t*o*s **spit* *llow_*i***n=**ls*. T** work*roun* *ui**n** *xpli*itly m*ntions ***in* s*l*.is_*i***n(p*t*) ****ks in *ont*ntsM*n***r m*t*o*s, in*i**tin* t**s* *un*tions l**k** pr