The trudesk application allows large characters to insert in the input field "Full Name" on the signup field which can allow attackers to cause a Denial of Service (DoS) via a crafted HTTP request in GitHub repository polonel/trudesk prior to 1.2.2. This can lead to Denial of service.
References
Link | Resource |
---|---|
https://github.com/polonel/trudesk/commit/87e231e04495fb705fe1e03cb56fc4136bafe895 | Patch Third Party Advisory |
https://huntr.dev/bounties/1ff8afe4-6ff7-45aa-a652-d8aac7e5be7e | Exploit Third Party Advisory |
https://github.com/polonel/trudesk/commit/87e231e04495fb705fe1e03cb56fc4136bafe895 | Patch Third Party Advisory |
https://huntr.dev/bounties/1ff8afe4-6ff7-45aa-a652-d8aac7e5be7e | Exploit Third Party Advisory |
Configurations
History
21 Nov 2024, 06:41
Type | Values Removed | Values Added |
---|---|---|
References | () https://github.com/polonel/trudesk/commit/87e231e04495fb705fe1e03cb56fc4136bafe895 - Patch, Third Party Advisory | |
References | () https://huntr.dev/bounties/1ff8afe4-6ff7-45aa-a652-d8aac7e5be7e - Exploit, Third Party Advisory |
Information
Published : 2022-09-29 03:15
Updated : 2024-11-21 06:41
NVD link : CVE-2022-1718
Mitre link : CVE-2022-1718
CVE.ORG link : CVE-2022-1718
JSON object : View
Products Affected
trudesk_project
- trudesk
CWE
CWE-190
Integer Overflow or Wraparound