CRLF Injection leads to Stack Trace Exposure due to lack of filtering at https://demo.microweber.org/ in Packagist microweber/microweber prior to 1.2.11.
References
Link | Resource |
---|---|
https://github.com/microweber/microweber/commit/f0e338f1b7dc5ec9d99231f4ed3fa6245a5eb128 | Patch Third Party Advisory |
https://huntr.dev/bounties/7215afc7-9133-4749-8e8e-0569317dbd55 | Exploit Patch Third Party Advisory |
https://github.com/microweber/microweber/commit/f0e338f1b7dc5ec9d99231f4ed3fa6245a5eb128 | Patch Third Party Advisory |
https://huntr.dev/bounties/7215afc7-9133-4749-8e8e-0569317dbd55 | Exploit Patch Third Party Advisory |
Configurations
History
21 Nov 2024, 06:39
Type | Values Removed | Values Added |
---|---|---|
References | () https://github.com/microweber/microweber/commit/f0e338f1b7dc5ec9d99231f4ed3fa6245a5eb128 - Patch, Third Party Advisory | |
References | () https://huntr.dev/bounties/7215afc7-9133-4749-8e8e-0569317dbd55 - Exploit, Patch, Third Party Advisory |
Information
Published : 2022-02-18 15:15
Updated : 2024-11-21 06:39
NVD link : CVE-2022-0666
Mitre link : CVE-2022-0666
CVE.ORG link : CVE-2022-0666
JSON object : View
Products Affected
microweber
- microweber
CWE
CWE-93
Improper Neutralization of CRLF Sequences ('CRLF Injection')