CVE Vulnerabilities

CVE-2022-31149

Authentication Bypass by Spoofing

Published: Sep 07, 2022 | Modified: Sep 13, 2022
CVSS 3.x
9.6
CRITICAL
Source:
NVD
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H
CVSS 2.x
RedHat/V2
RedHat/V3
Ubuntu

ActivityWatch open-source automated time tracker. Versions prior to 0.12.0b2 are vulnerable to DNS rebinding attacks. This vulnerability impacts everyone running ActivityWatch and gives the attacker full access to the ActivityWatch REST API. Users should upgrade to v0.12.0b2 or later to receive a patch. As a workaround, block DNS lookups that resolve to 127.0.0.1.

Weakness

This attack-focused weakness is caused by incorrectly implemented authentication schemes that are subject to spoofing attacks.

Affected Software

Name Vendor Start Version End Version
Activitywatch Activitywatch * 0.12.0 (excluding)
Activitywatch Activitywatch 0.12.0-beta1 (including) 0.12.0-beta1 (including)

References