lockss-daemon (aka Classic LOCKSS Daemon) before 1.77.3 performs post-Unicode normalization, which may allow bypass of intended access restrictions, such as when U+1FEF is converted to a backtick.
References
Link | Resource |
---|---|
https://github.com/lockss/lockss-daemon/security/advisories/GHSA-mgqj-hphf-9588 | Exploit Vendor Advisory |
Configurations
History
28 Dec 2023, 18:11
Type | Values Removed | Values Added |
---|---|---|
References | () https://github.com/lockss/lockss-daemon/security/advisories/GHSA-mgqj-hphf-9588 - Exploit, Vendor Advisory | |
CPE | cpe:2.3:a:lockss:classic_lockss_daemon:*:*:*:*:*:*:*:* | |
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 5.3 |
First Time |
Lockss
Lockss classic Lockss Daemon |
|
CWE | CWE-116 |
15 Dec 2023, 13:42
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2023-12-15 01:15
Updated : 2024-10-08 15:35
NVD link : CVE-2023-42183
Mitre link : CVE-2023-42183
CVE.ORG link : CVE-2023-42183
JSON object : View
Products Affected
lockss
- classic_lockss_daemon
CWE
CWE-116
Improper Encoding or Escaping of Output