CVE-2022-41958

super-xray is a web vulnerability scanning tool. Versions prior to 0.7 assumed trusted input for the program config which is stored in a yaml file. An attacker with local access to the file could exploit this and compromise the program. This issue has been addressed in commit `4d0d5966` and will be included in future releases. Users are advised to upgrade. There are no known workarounds for this issue.
Configurations

Configuration 1 (hide)

cpe:2.3:a:super_xray_project:super_xray:*:*:*:*:*:*:*:*

History

21 Nov 2024, 07:24

Type Values Removed Values Added
References () https://github.com/4ra1n/super-xray/commit/4d0d59663596db03f39d7edd2be251d48b52dcfc - Patch, Third Party Advisory () https://github.com/4ra1n/super-xray/commit/4d0d59663596db03f39d7edd2be251d48b52dcfc - Patch, Third Party Advisory
References () https://github.com/4ra1n/super-xray/security/advisories/GHSA-39pv-4vmj-c4fr - Exploit, Third Party Advisory () https://github.com/4ra1n/super-xray/security/advisories/GHSA-39pv-4vmj-c4fr - Exploit, Third Party Advisory
CVSS v2 : unknown
v3 : 7.8
v2 : unknown
v3 : 7.3

Information

Published : 2022-11-25 18:15

Updated : 2024-11-21 07:24


NVD link : CVE-2022-41958

Mitre link : CVE-2022-41958

CVE.ORG link : CVE-2022-41958


JSON object : View

Products Affected

super_xray_project

  • super_xray
CWE
CWE-502

Deserialization of Untrusted Data