CVE-2022-2037
📋 TL;DR
CVE-2022-2037 is an excessive attack surface vulnerability in ToolJet versions prior to v1.16.0 that exposes unnecessary endpoints and functionality. This allows attackers to potentially discover and exploit other vulnerabilities through exposed attack vectors. Organizations running ToolJet instances are affected.
💻 Affected Systems
- ToolJet
📦 What is this software?
Tooljet by Tooljet
⚠️ Risk & Real-World Impact
Worst Case
Attackers could chain this vulnerability with other exploits to achieve remote code execution, data exfiltration, or complete system compromise.
Likely Case
Attackers use exposed endpoints to discover additional vulnerabilities, perform reconnaissance, and potentially gain unauthorized access to application functionality.
If Mitigated
With proper network segmentation and access controls, impact is limited to information disclosure about available endpoints.
🎯 Exploit Status
The vulnerability exposes endpoints that could be discovered through simple enumeration techniques.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: v1.16.0
Vendor Advisory: https://github.com/tooljet/tooljet/commit/fadf025365823cbbc739a1313791c0a04621972b
Restart Required: Yes
Instructions:
1. Backup your ToolJet instance. 2. Update to ToolJet v1.16.0 or later using your deployment method (Docker, Kubernetes, etc.). 3. Restart the ToolJet service. 4. Verify the update was successful.
🔧 Temporary Workarounds
Network Access Restriction
allRestrict network access to ToolJet instances using firewalls or network security groups.
Reverse Proxy Configuration
allConfigure reverse proxy to filter and limit exposed endpoints.
🧯 If You Can't Patch
- Implement strict network segmentation and firewall rules to limit access to ToolJet instances
- Deploy web application firewall (WAF) with rules to block suspicious endpoint enumeration
🔍 How to Verify
Check if Vulnerable:
Check ToolJet version via web interface or API. Versions below 1.16.0 are vulnerable.
Check Version:
docker exec tooljet-container npm list tooljet | grep tooljet@ || check package.json version
Verify Fix Applied:
Verify ToolJet version is 1.16.0 or higher and test that unnecessary endpoints are no longer exposed.
📡 Detection & Monitoring
Log Indicators:
- Unusual endpoint access patterns
- Multiple 404 or 403 errors from enumeration attempts
- Access to deprecated or internal endpoints
Network Indicators:
- Unusual HTTP request patterns to ToolJet endpoints
- Port scanning or service enumeration against ToolJet instances
SIEM Query:
source="tooljet" AND (status=404 OR status=403) AND count by src_ip > threshold