Sojan Jose

6 exploits Active since Feb 2022
CVE-2021-3740 WRITEUP MEDIUM WRITEUP
chatwoot <2.4.0 - Session Fixation
A Session Fixation vulnerability exists in chatwoot/chatwoot versions prior to 2.4.0. The application does not invalidate existing sessions on other devices when a user changes their password, allowing old sessions to persist. This can lead to unauthorized access if an attacker has obtained a session token.
CVSS 6.8
CVE-2021-3741 WRITEUP MEDIUM WRITEUP
chatwoot/chatwoot <2.6 - XSS
A stored cross-site scripting (XSS) vulnerability was discovered in chatwoot/chatwoot, affecting all versions prior to 2.6. The vulnerability occurs when a user uploads an SVG file containing a malicious XSS payload in the profile settings. When the avatar is opened in a new page, the custom JavaScript code is executed, leading to potential security risks.
CVSS 5.4
CVE-2021-3742 WRITEUP HIGH WRITEUP
chatwoot/chatwoot <2.5.0 - SSRF
A Server-Side Request Forgery (SSRF) vulnerability was discovered in chatwoot/chatwoot, affecting all versions prior to 2.5.0. The vulnerability allows an attacker to upload an SVG file containing a malicious SSRF payload. When the SVG file is used as an avatar and opened in a new tab, it can trigger the SSRF, potentially leading to host redirection.
CVSS 8.8
CVE-2021-3813 WRITEUP MEDIUM WRITEUP
GitHub chatwoot/chatwoot < 2.2 - Privilege Escalation
Improper Privilege Management in GitHub repository chatwoot/chatwoot prior to v2.2.
CVSS 6.5
CVE-2022-2901 WRITEUP HIGH WRITEUP
Chatwoot < 2.8.0 - Improper Authorization
Improper Authorization in GitHub repository chatwoot/chatwoot prior to 2.8.
CVSS 7.1
CVE-2022-3741 WRITEUP CRITICAL WRITEUP
Chatwoot < 2.10.0 - Brute Force
Impact varies for each individual vulnerability in the application. For generation of accounts, it may be possible, depending on the amount of system resources available, to create a DoS event in the server. These accounts still need to be activated; however, it is possible to identify the output Status Code to separate accounts that are generated and waiting for email verification. \n\nFor the sign in directories, it is possible to brute force login attempts to either login portal, which could lead to account compromise.
CVSS 9.8