{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-05-01T21:16:57.819","vulnerabilities":[{"cve":{"id":"CVE-2022-39268","sourceIdentifier":"security-advisories@github.com","published":"2022-09-30T21:15:09.543","lastModified":"2024-11-21T07:17:55.243","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"### Impact In a CSRF attack, an innocent end user is tricked by an attacker into submitting a web request that they did not intend. This may cause actions to be performed on the website that can include inadvertent client or server data leakage, change of session state, or manipulation of an end user's account. ### Patch Upgrade to v2022.09.10 to patch this vulnerability. ### Workarounds Rebuild and redeploy the Orchest `auth-server` with this commit: https://github.com/orchest/orchest/commit/c2587a963cca742c4a2503bce4cfb4161bf64c2d ### References https://en.wikipedia.org/wiki/Cross-site_request_forgery https://cwe.mitre.org/data/definitions/352.html ### For more information If you have any questions or comments about this advisory: * Open an issue in https://github.com/orchest/orchest * Email us at rick@orchest.io"},{"lang":"es","value":"### Impacto En un ataque de tipo CSRF, un usuario final inocente es engañado por un atacante para que envíe una petición web que no pretendía. Esto puede causar que sean llevado a cabo acciones en el sitio web que pueden incluir la filtración inadvertida de datos del cliente o del servidor, el cambio del estado de la sesión o la manipulación de la cuenta de un usuario final. ### Parche Actualice a versión 2022.09.10 para parchear esta vulnerabilidad. ### Mitigaciones Reconstruya y redistribuya el Orchest \"auth-server\" con este commit: https://github.com/orchest/orchest/commit/c2587a963cca742c4a2503bce4cfb4161bf64c2d ### Referencias https://en.wikipedia.org/wiki/Cross-site_request_forgery https://cwe.mitre.org/data/definitions/352.html ### Para más información Si presenta alguna pregunta o comentario sobre este aviso: * Abra una incidencia en https://github.com/orchest/orchest * Envíenos un correo electrónico a rick@orchest.io"}],"metrics":{"cvssMetricV31":[{"source":"security-advisories@github.com","type":"Secondary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N","baseScore":8.1,"baseSeverity":"HIGH","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"REQUIRED","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"NONE"},"exploitabilityScore":2.8,"impactScore":5.2},{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N","baseScore":8.1,"baseSeverity":"HIGH","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"REQUIRED","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"NONE"},"exploitabilityScore":2.8,"impactScore":5.2}]},"weaknesses":[{"source":"security-advisories@github.com","type":"Secondary","description":[{"lang":"en","value":"CWE-352"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:orchest:orchest:*:*:*:*:*:*:*:*","versionStartIncluding":"2022.03.7","versionEndIncluding":"2022.09.9","matchCriteriaId":"70A89378-9D8F-4B36-BAF3-FE79AEDA8B5E"}]}]}],"references":[{"url":"https://github.com/orchest/orchest/commit/c2587a963cca742c4a2503bce4cfb4161bf64c2d","source":"security-advisories@github.com","tags":["Patch","Third Party Advisory"]},{"url":"https://github.com/orchest/orchest/pull/1324","source":"security-advisories@github.com","tags":["Patch","Third Party Advisory"]},{"url":"https://github.com/orchest/orchest/releases/tag/v2022.09.10","source":"security-advisories@github.com","tags":["Release Notes","Third Party Advisory"]},{"url":"https://github.com/orchest/orchest/security/advisories/GHSA-q44f-8jpw-qv4j","source":"security-advisories@github.com","tags":["Third Party Advisory"]},{"url":"https://github.com/orchest/orchest/commit/c2587a963cca742c4a2503bce4cfb4161bf64c2d","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Patch","Third Party Advisory"]},{"url":"https://github.com/orchest/orchest/pull/1324","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Patch","Third Party Advisory"]},{"url":"https://github.com/orchest/orchest/releases/tag/v2022.09.10","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Release Notes","Third Party Advisory"]},{"url":"https://github.com/orchest/orchest/security/advisories/GHSA-q44f-8jpw-qv4j","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Third Party Advisory"]}]}}]}