CVE-2022-23223

On Apache ShenYu versions 2.4.0 and 2.4.1, and endpoint existed that disclosed the passwords of all users. Users are recommended to upgrade to version 2.4.2 or later.
References
Link Resource
http://www.openwall.com/lists/oss-security/2022/01/25/7 Mailing List Third Party Advisory
http://www.openwall.com/lists/oss-security/2022/01/26/4 Exploit Mailing List Patch Third Party Advisory
https://lists.apache.org/thread/q2gg6ny6lpkph7nkrvjzqdvqpm805v8s Mailing List Vendor Advisory
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:apache:shenyu:2.4.0:*:*:*:*:*:*:*
cpe:2.3:a:apache:shenyu:2.4.1:*:*:*:*:*:*:*

History

04 Oct 2023, 09:15

Type Values Removed Values Added
Summary The HTTP response will disclose the user password. This issue affected Apache ShenYu 2.4.0 and 2.4.1. On Apache ShenYu versions 2.4.0 and 2.4.1, and endpoint existed that disclosed the passwords of all users. Users are recommended to upgrade to version 2.4.2 or later.
CWE CWE-319 CWE-522

13 Jul 2023, 14:26

Type Values Removed Values Added
CWE CWE-522 CWE-319

Information

Published : 2022-01-25 13:15

Updated : 2024-02-28 18:48


NVD link : CVE-2022-23223

Mitre link : CVE-2022-23223

CVE.ORG link : CVE-2022-23223


JSON object : View

Products Affected

apache

  • shenyu
CWE
CWE-522

Insufficiently Protected Credentials