CVE-2022-23722
02.05.2022, 22:15
When a password reset mechanism is configured to use the Authentication API with an Authentication Policy, email One-Time Password, PingID or SMS authentication, an existing user can reset another existing users password.Enginsight
Vendor | Product | Version |
---|---|---|
pingidentity | pingfederate | 9.3.0 ≤ 𝑥 < 9.3.3 |
pingidentity | pingfederate | 10.0.0 ≤ 𝑥 < 10.0.12 |
pingidentity | pingfederate | 10.1.0 ≤ 𝑥 < 10.1.9 |
pingidentity | pingfederate | 10.2.0 ≤ 𝑥 < 10.2.7 |
pingidentity | pingfederate | 10.3.0 ≤ 𝑥 < 10.3.4 |
pingidentity | pingfederate | 9.3.3:p15 |
pingidentity | pingfederate | 11.0.0 |
𝑥
= Vulnerable software versions
Common Weakness Enumeration
- CWE-288 - Authentication Bypass Using an Alternate Path or ChannelA product requires authentication, but the product has an alternate path or channel that does not require authentication.
- CWE-287 - Improper AuthenticationWhen an actor claims to have a given identity, the software does not prove or insufficiently proves that the claim is correct.
References