super-xray is a web vulnerability scanning tool. Versions prior to 0.7 assumed trusted input for the program config which is stored in a yaml file. An attacker with local access to the file could exploit this and compromise the program. This issue has been addressed in commit `4d0d5966` and will be included in future releases. Users are advised to upgrade. There are no known workarounds for this issue.
References
Link | Resource |
---|---|
https://github.com/4ra1n/super-xray/commit/4d0d59663596db03f39d7edd2be251d48b52dcfc | Patch Third Party Advisory |
https://github.com/4ra1n/super-xray/security/advisories/GHSA-39pv-4vmj-c4fr | Exploit Third Party Advisory |
https://github.com/4ra1n/super-xray/commit/4d0d59663596db03f39d7edd2be251d48b52dcfc | Patch Third Party Advisory |
https://github.com/4ra1n/super-xray/security/advisories/GHSA-39pv-4vmj-c4fr | Exploit Third Party Advisory |
Configurations
History
21 Nov 2024, 07:24
Type | Values Removed | Values Added |
---|---|---|
References | () https://github.com/4ra1n/super-xray/commit/4d0d59663596db03f39d7edd2be251d48b52dcfc - Patch, Third Party Advisory | |
References | () https://github.com/4ra1n/super-xray/security/advisories/GHSA-39pv-4vmj-c4fr - Exploit, Third Party Advisory | |
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 7.3 |
Information
Published : 2022-11-25 18:15
Updated : 2024-11-21 07:24
NVD link : CVE-2022-41958
Mitre link : CVE-2022-41958
CVE.ORG link : CVE-2022-41958
JSON object : View
Products Affected
super_xray_project
- super_xray
CWE
CWE-502
Deserialization of Untrusted Data