{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-04-29T22:17:20.581","vulnerabilities":[{"cve":{"id":"CVE-2022-31113","sourceIdentifier":"security-advisories@github.com","published":"2022-07-01T17:15:07.693","lastModified":"2024-11-21T07:03:55.397","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"Canarytokens is an open source tool which helps track activity and actions on your network. A Cross-Site Scripting vulnerability was identified in the history page of triggered Canarytokens. This permits an attacker who recognised an HTTP-based Canarytoken (a URL) to execute Javascript in the Canarytoken's history page (domain: canarytokens.org) when the history page is later visited by the Canarytoken's creator. This vulnerability could be used to disable or delete the affected Canarytoken, or view its activation history. It might also be used as a stepping stone towards revealing more information about the Canarytoken's creator to the attacker. For example, an attacker could recover the email address tied to the Canarytoken, or place Javascript on the history page that redirect the creator towards an attacker-controlled Canarytoken to show the creator's network location. An attacker could only act on the discovered Canarytoken. This issue did not expose other Canarytokens or other Canarytoken creators. The issue has been patched on Canarytokens.org and in the latest release. No signs of successful exploitation of this vulnerability have been found. Users are advised to upgrade. There are no known workarounds for this issue."},{"lang":"es","value":"Canarytokens es una herramienta de código abierto que ayuda a rastrear la actividad y las acciones en su red. Ha sido identificada una vulnerabilidad de tipo Cross-Site Scripting en la página del historial de Canarytokens activada. Esto permite a un atacante que haya reconocido un Canarytoken basado en HTTP (una URL) ejecutar Javascript en la página del historial del Canarytoken (dominio: canarytokens.org) cuando la página del historial es visitada posteriormente por el creador del Canarytoken. Esta vulnerabilidad podría usarse para deshabilitar o eliminar el Canarytoken afectado, o para visualizar su historial de activación. También podría usarse como un trampolín para revelar más información sobre el creador del Canarytoken al atacante. Por ejemplo, un atacante podría recuperar la dirección de correo electrónico vinculada al Canarytoken, o colocar Javascript en la página del historial que redirija al creador hacia un Canarytoken controlado por el atacante para mostrar la ubicación de la red del creador. Un atacante sólo podía actuar sobre el Canarytoken detectado. Este problema no exponía otros Canarytokens u otros creadores de Canarytoken. El problema ha sido parcheado en Canarytokens.org y en la última versión. No han sido encontrado indicios de explotación con éxito de esta vulnerabilidad. Es recomendado a usuarios actualizar. No se presentan mitigaciones conocidas para este problema"}],"metrics":{"cvssMetricV31":[{"source":"security-advisories@github.com","type":"Secondary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L","baseScore":6.3,"baseSeverity":"MEDIUM","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"REQUIRED","scope":"UNCHANGED","confidentialityImpact":"LOW","integrityImpact":"LOW","availabilityImpact":"LOW"},"exploitabilityScore":2.8,"impactScore":3.4},{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N","baseScore":6.1,"baseSeverity":"MEDIUM","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"REQUIRED","scope":"CHANGED","confidentialityImpact":"LOW","integrityImpact":"LOW","availabilityImpact":"NONE"},"exploitabilityScore":2.8,"impactScore":2.7}],"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:M/Au:N/C:N/I:P/A:N","baseScore":4.3,"accessVector":"NETWORK","accessComplexity":"MEDIUM","authentication":"NONE","confidentialityImpact":"NONE","integrityImpact":"PARTIAL","availabilityImpact":"NONE"},"baseSeverity":"MEDIUM","exploitabilityScore":8.6,"impactScore":2.9,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":true}]},"weaknesses":[{"source":"security-advisories@github.com","type":"Secondary","description":[{"lang":"en","value":"CWE-79"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:thinkst:canarytokens:*:*:*:*:*:*:*:*","versionEndExcluding":"2022-07-01","matchCriteriaId":"93108B1A-4C16-4265-A854-89E5B0B8ACDD"}]}]}],"references":[{"url":"https://github.com/thinkst/canarytokens/commit/dc378957bc28a6f3b5a8d7217b0605d81111f090","source":"security-advisories@github.com","tags":["Patch","Third Party Advisory"]},{"url":"https://github.com/thinkst/canarytokens/security/advisories/GHSA-5675-3424-hpqr","source":"security-advisories@github.com","tags":["Third Party Advisory"]},{"url":"https://github.com/thinkst/canarytokens/commit/dc378957bc28a6f3b5a8d7217b0605d81111f090","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Patch","Third Party Advisory"]},{"url":"https://github.com/thinkst/canarytokens/security/advisories/GHSA-5675-3424-hpqr","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Third Party Advisory"]}]}}]}