CVE-2022-23497

FreshRSS is a free, self-hostable RSS aggregator. User configuration files can be accessed by a remote user. In addition to user preferences, such configurations contain hashed passwords (brypt with cost 9, salted) of FreshRSS Web interface. If the API is used, the configuration might contain a hashed password (brypt with cost 9, salted) of the GReader API, and a hashed password (MD5 salted) of the Fever API. Users should update to version 1.20.2 or edge. Users unable to upgrade can apply the patch manually or delete the file `./FreshRSS/p/ext.php`.
Configurations

Configuration 1 (hide)

cpe:2.3:a:freshrss:freshrss:*:*:*:*:*:*:*:*

History

21 Nov 2024, 06:48

Type Values Removed Values Added
References () https://github.com/FreshRSS/FreshRSS/pull/4928 - Patch, Third Party Advisory () https://github.com/FreshRSS/FreshRSS/pull/4928 - Patch, Third Party Advisory
References () https://github.com/FreshRSS/FreshRSS/releases/tag/1.20.2 - Patch, Third Party Advisory () https://github.com/FreshRSS/FreshRSS/releases/tag/1.20.2 - Patch, Third Party Advisory
References () https://github.com/FreshRSS/FreshRSS/security/advisories/GHSA-hvrj-5fwj-p7v6 - Third Party Advisory () https://github.com/FreshRSS/FreshRSS/security/advisories/GHSA-hvrj-5fwj-p7v6 - Third Party Advisory
CVSS v2 : unknown
v3 : 7.5
v2 : unknown
v3 : 6.5

Information

Published : 2022-12-09 23:15

Updated : 2024-11-21 06:48


NVD link : CVE-2022-23497

Mitre link : CVE-2022-23497

CVE.ORG link : CVE-2022-23497


JSON object : View

Products Affected

freshrss

  • freshrss
CWE
CWE-200

Exposure of Sensitive Information to an Unauthorized Actor