Low-code platform for building business applications. Connect to databases, cloud storages, GraphQL, API endpoints, Airtable, Google sheets, OpenAI, etc and build apps using drag and drop application builder. Built using JavaScript/TypeScript. 🚀

CVE History

CVEPublishedCVSS v2CVSS v3
CVE-2022-41116.5 MEDIUMN/A
Unrestricted file size limit can lead to DoS in tooljet/tooljet <1.27 by allowing a logged in attacker to upload profile pictures over 2MB.
CVE-2022-34227.5 HIGHN/A
Account Takeover :: when see the info i can see the hash pass i can creaked it ............... Account Takeover :: when see the info i can see the forgot_password_token the hacker can send the request and changed the pass
CVE-2022-33484.9 MEDIUMN/A
Just like in the previous report, an attacker could steal the account of different users. But in this case, it's a little bit more specific, because it is needed to be an editor in the same app as the victim.
CVE-2022-30198.8 HIGHN/A
The forgot password token basically just makes us capable of taking over the account of whoever comment in an app that we can see (bruteforcing comment id's might also be an option but I wouldn't count on it, since it would take a long time to find a valid one).
CVE-2022-26318.8 HIGHN/A
Improper Access Control in GitHub repository tooljet/tooljet prior to v1.19.0.
CVE-2022-20378 HIGH6 MEDIUM
Excessive Attack Surface in GitHub repository tooljet/tooljet prior to v1.16.0.
CVE-2022-230678.8 HIGH6.8 MEDIUM
ToolJet versions v0.5.0 to v1.2.2 are vulnerable to token leakage via Referer header that leads to account takeover . If the user opens the invite link/signup link and then clicks on any external links within the page, it leaks the password set token/signup token in the referer header. Using these tokens the attacker can access the user’s account.
CVE-2022-230685.4 MEDIUM3.5 LOW
ToolJet versions v0.6.0 to v1.10.2 are vulnerable to HTML injection where an attacker can inject malicious code inside the first name and last name field while inviting a new user which will be reflected in the invitational e-mail.