Show plain JSON{"dataType": "CVE_RECORD", "dataVersion": "5.1", "cveMetadata": {"cveId": "CVE-2022-25769", "assignerOrgId": "4e531c38-7a33-45d3-98dd-d909c0d8852e", "state": "PUBLISHED", "assignerShortName": "Mautic", "dateReserved": "2022-02-22T20:17:36.804Z", "datePublished": "2024-09-18T14:47:09.029Z", "dateUpdated": "2024-09-18T21:28:12.305Z"}, "containers": {"cna": {"affected": [{"collectionURL": "https://packagist.org", "defaultStatus": "unaffected", "packageName": "mautic/core", "product": "Mautic", "repo": "https://github.com/mautic/mautic", "vendor": "Mautic", "versions": [{"status": "affected", "version": "< 3.3.5", "versionType": "semver"}, {"status": "affected", "version": "< 4.2.0", "versionType": "semver"}]}], "credits": [{"lang": "en", "type": "finder", "value": "Mattias Michaux"}, {"lang": "en", "type": "remediation developer", "value": "Mattias Michaux"}, {"lang": "en", "type": "remediation reviewer", "value": "John Linhart"}, {"lang": "en", "type": "remediation reviewer", "value": "Zdeno Kuzmany"}], "datePublic": "2022-03-02T14:47:00.000Z", "descriptions": [{"lang": "en", "supportingMedia": [{"base64": false, "type": "text/html", "value": "<h2>Impact</h2>The default .htaccess file has some restrictions in the access to PHP files to only allow specific PHP files to be executed in the root of the application.<br><br>This logic isn't correct, as the regex in the second FilesMatch only checks the filename, not the full path."}], "value": "ImpactThe default .htaccess file has some restrictions in the access to PHP files to only allow specific PHP files to be executed in the root of the application.\n\nThis logic isn't correct, as the regex in the second FilesMatch only checks the filename, not the full path."}], "metrics": [{"cvssV3_1": {"attackComplexity": "HIGH", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.2, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "HIGH", "privilegesRequired": "HIGH", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:N/I:H/A:H", "version": "3.1"}, "format": "CVSS", "scenarios": [{"lang": "en", "value": "GENERAL"}]}], "problemTypes": [{"descriptions": [{"cweId": "CWE-1284", "description": "CWE-1284 Improper Validation of Specified Quantity in Input", "lang": "en", "type": "CWE"}]}], "providerMetadata": {"orgId": "4e531c38-7a33-45d3-98dd-d909c0d8852e", "shortName": "Mautic", "dateUpdated": "2024-09-18T21:28:12.305Z"}, "references": [{"url": "https://github.com/mautic/mautic/security/advisories/GHSA-mj6m-246h-9w56"}, {"url": "https://www.mautic.org/blog/community/mautic-4-2-one-small-step-mautic"}], "solutions": [{"lang": "en", "supportingMedia": [{"base64": false, "type": "text/html", "value": "Upgrade to 3.3.5 or 4.2.0. <br><br>If you're using Mautic in a sub-folder with Apache <span style=\"background-color: rgb(255, 255, 255);\">(e.g. example.com/mautic)</span>, <span style=\"background-color: rgb(255, 255, 255);\">please review the guidance in </span><a target=\"_blank\" rel=\"nofollow\" href=\"https://github.com/mautic/mautic/issues/10913#issuecomment-1055681986\">this GitHub issue</a><span style=\"background-color: rgb(255, 255, 255);\"> before updating, as you will probably need to make some changes to the .htaccess file after you update.</span><br>"}], "value": "Upgrade to 3.3.5 or 4.2.0. \n\nIf you're using Mautic in a sub-folder with Apache (e.g. example.com/mautic), please review the guidance in this GitHub issue https://github.com/mautic/mautic/issues/10913#issuecomment-1055681986 \u00a0before updating, as you will probably need to make some changes to the .htaccess file after you update."}], "source": {"advisory": "GHSA-mj6m-246h-9w56", "discovery": "UNKNOWN"}, "title": "Improper regex in htaccess file", "x_generator": {"engine": "Vulnogram 0.2.0"}}, "adp": [{"affected": [{"vendor": "mautic", "product": "mautic", "cpes": ["cpe:2.3:a:mautic:mautic:-:*:*:*:*:*:*:*"], "defaultStatus": "unknown", "versions": [{"version": "0", "status": "affected", "lessThan": "3.3.5", "versionType": "custom"}, {"version": "0", "status": "affected", "lessThan": "4.2.0", "versionType": "custom"}]}], "metrics": [{"other": {"type": "ssvc", "content": {"timestamp": "2024-09-18T18:10:59.918348Z", "id": "CVE-2022-25769", "options": [{"Exploitation": "none"}, {"Automatable": "no"}, {"Technical Impact": "total"}], "role": "CISA Coordinator", "version": "2.0.3"}}}], "title": "CISA ADP Vulnrichment", "providerMetadata": {"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP", "dateUpdated": "2024-09-18T18:12:16.003Z"}}]}}