A Cross-Site Request Forgery (CSRF) in Ferdi through 5.8.1 and Ferdium through 6.0.0-nightly.98 allows attackers to read files via an uploaded file such as a settings/preferences file.
References
Link | Resource |
---|---|
https://getferdi.com/ | Product |
https://gist.github.com/omriinbar-cyesec/c1179fe99725d2b828b6573c0d110c9c | Third Party Advisory |
https://github.com/getferdi/ferdi | Third Party Advisory |
https://getferdi.com/ | Product |
https://gist.github.com/omriinbar-cyesec/c1179fe99725d2b828b6573c0d110c9c | Third Party Advisory |
https://github.com/getferdi/ferdi | Third Party Advisory |
Configurations
Configuration 1 (hide)
|
History
21 Nov 2024, 07:06
Type | Values Removed | Values Added |
---|---|---|
References | () https://getferdi.com/ - Product | |
References | () https://gist.github.com/omriinbar-cyesec/c1179fe99725d2b828b6573c0d110c9c - Third Party Advisory | |
References | () https://github.com/getferdi/ferdi - Third Party Advisory |
Information
Published : 2022-07-17 17:15
Updated : 2024-11-21 07:06
NVD link : CVE-2022-32320
Mitre link : CVE-2022-32320
CVE.ORG link : CVE-2022-32320
JSON object : View
Products Affected
ferdium
- ferdium
getferdi
- ferdi
CWE
CWE-352
Cross-Site Request Forgery (CSRF)