CVE-2022-0749

This affects all versions of package SinGooCMS.Utility. The socket client in the package can pass in the payload via the user-controllable input after it has been established, because this socket client transmission does not have the appropriate restrictions or type bindings for the BinaryFormatter.
Configurations

Configuration 1 (hide)

cpe:2.3:a:singoo:singoocms.utility:-:*:*:*:*:*:*:*

History

21 Nov 2024, 06:39

Type Values Removed Values Added
CVSS v2 : 7.5
v3 : 9.8
v2 : 7.5
v3 : 7.4
References () https://github.com/SinGooCMS/SinGooCMSUtility/blob/master/SinGooCMS.Utility/Net/SocketClient.cs - Exploit, Third Party Advisory () https://github.com/SinGooCMS/SinGooCMSUtility/blob/master/SinGooCMS.Utility/Net/SocketClient.cs - Exploit, Third Party Advisory
References () https://github.com/SinGooCMS/SinGooCMSUtility/issues/1 - Exploit, Issue Tracking, Third Party Advisory () https://github.com/SinGooCMS/SinGooCMSUtility/issues/1 - Exploit, Issue Tracking, Third Party Advisory
References () https://snyk.io/vuln/SNYK-DOTNET-SINGOOCMSUTILITY-2312979 - Exploit, Issue Tracking, Third Party Advisory () https://snyk.io/vuln/SNYK-DOTNET-SINGOOCMSUTILITY-2312979 - Exploit, Issue Tracking, Third Party Advisory

Information

Published : 2022-03-17 12:15

Updated : 2024-11-21 06:39


NVD link : CVE-2022-0749

Mitre link : CVE-2022-0749

CVE.ORG link : CVE-2022-0749


JSON object : View

Products Affected

singoo

  • singoocms.utility
CWE
CWE-502

Deserialization of Untrusted Data