Goal Reached Thanks to every supporter β€” we hit 100%!

Goal: 1000 CNY Β· Raised: 1000 CNY

100.0%

CVE-2021-22911 β€” AI Deep Analysis Summary

Q1What is this vulnerability? (Essence + Consequences)

🚨 **Essence**: A Pre-Auth Blind NoSQL Injection in Rocket.Chat. πŸ’₯ **Consequences**: Attackers can hijack accounts via leaked password reset tokens.…

Q2Root Cause? (CWE/Flaw)

πŸ›‘οΈ **Root Cause**: **CWE-75** (NoSQL Injection). The flaw lies in the `getPasswordPolicy` endpoint.…

Q3Who is affected? (Versions/Components)

πŸ“¦ **Affected**: Rocket.Chat Server versions **3.11**, **3.12**, and **3.13** (specifically tested on 3.12.1). 🌐 **Component**: The password reset mechanism (`getPasswordPolicy` method).

Q4What can hackers do? (Privileges/Data)

πŸ•΅οΈ **Attacker Capabilities**: 1. **Unauthenticated Account Takeover**: Leak password reset tokens for any user. 2. **Privilege Escalation**: Take over Admin accounts. 3.…

Q5Is exploitation threshold high? (Auth/Config)

⚑ **Threshold**: **LOW**. No authentication or authorization is required to trigger the injection. It is a **Pre-Auth** vulnerability, making it extremely easy to exploit for any internet-facing instance.

Q6Is there a public Exp? (PoC/Wild Exploitation)

πŸ’£ **Public Exploits**: **YES**. Multiple PoCs are available on GitHub (e.g., by CsEnox, optionalCTF, ChrisPritchard). Automated scripts exist for account takeover and RCE. πŸ“₯ **Exploit-DB**: ID 49960.

Q7How to self-check? (Features/Scanning)

πŸ” **Self-Check**: 1. Check Rocket.Chat version (3.11-3.13). 2. Scan for the `getPasswordPolicy` endpoint. 3. Test if the password reset token parameter accepts JSON injection payloads (like `$regex`). 4.…

Q8Is it fixed officially? (Patch/Mitigation)

🩹 **Fix Status**: **YES**. The vulnerability was published in May 2021. Users must upgrade to a patched version of Rocket.Chat immediately. πŸ“’ **Reference**: SonarSource blog and official CVE details.

Q9What if no patch? (Workaround)

🚧 **Workaround (If No Patch)**: 1. **Block Access**: Restrict access to the `/api/v1/method.getPasswordPolicy` endpoint via WAF or firewall. 2.…

Q10Is it urgent? (Priority Suggestion)

πŸ”₯ **Urgency**: **CRITICAL**. Since it allows **Unauthenticated RCE**, it is a high-priority target for attackers. Immediate patching or mitigation is required to prevent full server compromise. πŸƒβ€β™‚οΈπŸ’¨