FreshRSS is a free, self-hostable RSS aggregator. User configuration files can be accessed by a remote user. In addition to user preferences, such configurations contain hashed passwords (brypt with cost 9, salted) of FreshRSS Web interface. If the API is used, the configuration might contain a hashed password (brypt with cost 9, salted) of the GReader API, and a hashed password (MD5 salted) of the Fever API. Users should update to version 1.20.2 or edge. Users unable to upgrade can apply the patch manually or delete the file `./FreshRSS/p/ext.php`.
References
Link | Resource |
---|---|
https://github.com/FreshRSS/FreshRSS/pull/4928 | Patch Third Party Advisory |
https://github.com/FreshRSS/FreshRSS/releases/tag/1.20.2 | Patch Third Party Advisory |
https://github.com/FreshRSS/FreshRSS/security/advisories/GHSA-hvrj-5fwj-p7v6 | Third Party Advisory |
https://github.com/FreshRSS/FreshRSS/pull/4928 | Patch Third Party Advisory |
https://github.com/FreshRSS/FreshRSS/releases/tag/1.20.2 | Patch Third Party Advisory |
https://github.com/FreshRSS/FreshRSS/security/advisories/GHSA-hvrj-5fwj-p7v6 | Third Party Advisory |
Configurations
History
21 Nov 2024, 06:48
Type | Values Removed | Values Added |
---|---|---|
References | () https://github.com/FreshRSS/FreshRSS/pull/4928 - Patch, Third Party Advisory | |
References | () https://github.com/FreshRSS/FreshRSS/releases/tag/1.20.2 - Patch, Third Party Advisory | |
References | () https://github.com/FreshRSS/FreshRSS/security/advisories/GHSA-hvrj-5fwj-p7v6 - Third Party Advisory | |
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 6.5 |
Information
Published : 2022-12-09 23:15
Updated : 2024-11-21 06:48
NVD link : CVE-2022-23497
Mitre link : CVE-2022-23497
CVE.ORG link : CVE-2022-23497
JSON object : View
Products Affected
freshrss
- freshrss
CWE
CWE-200
Exposure of Sensitive Information to an Unauthorized Actor