CVE-2022-23497
Vulnerability from cvelistv5
Published
2022-12-09 22:16
Modified
2025-04-23 16:29
Severity ?
EPSS score ?
Summary
Insecure file access in FreshRSS
References
▼ | URL | Tags | |
---|---|---|---|
security-advisories@github.com | https://github.com/FreshRSS/FreshRSS/pull/4928 | Patch, Third Party Advisory | |
security-advisories@github.com | https://github.com/FreshRSS/FreshRSS/releases/tag/1.20.2 | Patch, Third Party Advisory | |
security-advisories@github.com | https://github.com/FreshRSS/FreshRSS/security/advisories/GHSA-hvrj-5fwj-p7v6 | Third Party Advisory |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T03:43:46.085Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "https://github.com/FreshRSS/FreshRSS/security/advisories/GHSA-hvrj-5fwj-p7v6", "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://github.com/FreshRSS/FreshRSS/security/advisories/GHSA-hvrj-5fwj-p7v6" }, { "name": "https://github.com/FreshRSS/FreshRSS/pull/4928", "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://github.com/FreshRSS/FreshRSS/pull/4928" }, { "name": "https://github.com/FreshRSS/FreshRSS/releases/tag/1.20.2", "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://github.com/FreshRSS/FreshRSS/releases/tag/1.20.2" } ], "title": "CVE Program Container" }, { "metrics": [ { "other": { "content": { "id": "CVE-2022-23497", "options": [ { "Exploitation": "none" }, { "Automatable": "yes" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2025-04-23T15:47:17.092178Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2025-04-23T16:29:06.755Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "product": "FreshRSS", "vendor": "FreshRSS", "versions": [ { "status": "affected", "version": "\u003e= 1.18.0, \u003c 1.20.2" } ] } ], "descriptions": [ { "lang": "en", "value": "FreshRSS is a free, self-hostable RSS aggregator. User configuration files can be accessed by a remote user. In addition to user preferences, such configurations contain hashed passwords (brypt with cost 9, salted) of FreshRSS Web interface. If the API is used, the configuration might contain a hashed password (brypt with cost 9, salted) of the GReader API, and a hashed password (MD5 salted) of the Fever API. Users should update to version 1.20.2 or edge. Users unable to upgrade can apply the patch manually or delete the file `./FreshRSS/p/ext.php`." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-200", "description": "CWE-200: Exposure of Sensitive Information to an Unauthorized Actor", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2022-12-09T22:16:00.220Z", "orgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "shortName": "GitHub_M" }, "references": [ { "name": "https://github.com/FreshRSS/FreshRSS/security/advisories/GHSA-hvrj-5fwj-p7v6", "tags": [ "x_refsource_CONFIRM" ], "url": "https://github.com/FreshRSS/FreshRSS/security/advisories/GHSA-hvrj-5fwj-p7v6" }, { "name": "https://github.com/FreshRSS/FreshRSS/pull/4928", "tags": [ "x_refsource_MISC" ], "url": "https://github.com/FreshRSS/FreshRSS/pull/4928" }, { "name": "https://github.com/FreshRSS/FreshRSS/releases/tag/1.20.2", "tags": [ "x_refsource_MISC" ], "url": "https://github.com/FreshRSS/FreshRSS/releases/tag/1.20.2" } ], "source": { "advisory": "GHSA-hvrj-5fwj-p7v6", "discovery": "UNKNOWN" }, "title": "Insecure file access in FreshRSS" } }, "cveMetadata": { "assignerOrgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "assignerShortName": "GitHub_M", "cveId": "CVE-2022-23497", "datePublished": "2022-12-09T22:16:00.220Z", "dateReserved": "2022-01-19T21:23:53.767Z", "dateUpdated": "2025-04-23T16:29:06.755Z", "requesterUserId": "c184a3d9-dc98-4c48-a45b-d2d88cf0ac74", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1", "meta": { "nvd": "{\"cve\":{\"id\":\"CVE-2022-23497\",\"sourceIdentifier\":\"security-advisories@github.com\",\"published\":\"2022-12-09T23:15:11.680\",\"lastModified\":\"2022-12-13T15:14:40.763\",\"vulnStatus\":\"Analyzed\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"FreshRSS is a free, self-hostable RSS aggregator. User configuration files can be accessed by a remote user. In addition to user preferences, such configurations contain hashed passwords (brypt with cost 9, salted) of FreshRSS Web interface. If the API is used, the configuration might contain a hashed password (brypt with cost 9, salted) of the GReader API, and a hashed password (MD5 salted) of the Fever API. Users should update to version 1.20.2 or edge. Users unable to upgrade can apply the patch manually or delete the file `./FreshRSS/p/ext.php`.\"},{\"lang\":\"es\",\"value\":\"FreshRSS es un agregador de RSS gratuito y autohospedable. Un usuario remoto puede acceder a los archivos de configuraci\u00f3n del usuario. Adem\u00e1s de las preferencias del usuario, dichas configuraciones contienen contrase\u00f1as hash (brypt con costo 9, saladas) de la interfaz web FreshRSS. Si se utiliza la API, la configuraci\u00f3n puede contener una contrase\u00f1a hash (brypt con costo 9, salada) de la API GReader y una contrase\u00f1a hash (MD5 salada) de la API Fever. Los usuarios deben actualizar a la versi\u00f3n 1.20.2 o edge. Los usuarios que no puedan actualizar pueden aplicar el parche manualmente o eliminar el archivo `./FreshRSS/p/ext.php`.\"}],\"metrics\":{\"cvssMetricV31\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"NONE\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"HIGH\",\"integrityImpact\":\"NONE\",\"availabilityImpact\":\"NONE\",\"baseScore\":7.5,\"baseSeverity\":\"HIGH\"},\"exploitabilityScore\":3.9,\"impactScore\":3.6},{\"source\":\"security-advisories@github.com\",\"type\":\"Secondary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"NONE\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"LOW\",\"integrityImpact\":\"NONE\",\"availabilityImpact\":\"LOW\",\"baseScore\":6.5,\"baseSeverity\":\"MEDIUM\"},\"exploitabilityScore\":3.9,\"impactScore\":2.5}]},\"weaknesses\":[{\"source\":\"security-advisories@github.com\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-200\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:freshrss:freshrss:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"1.18.0\",\"versionEndExcluding\":\"1.20.2\",\"matchCriteriaId\":\"EE2D8147-E1C5-47A5-A70A-FDB48A4F291A\"}]}]}],\"references\":[{\"url\":\"https://github.com/FreshRSS/FreshRSS/pull/4928\",\"source\":\"security-advisories@github.com\",\"tags\":[\"Patch\",\"Third Party Advisory\"]},{\"url\":\"https://github.com/FreshRSS/FreshRSS/releases/tag/1.20.2\",\"source\":\"security-advisories@github.com\",\"tags\":[\"Patch\",\"Third Party Advisory\"]},{\"url\":\"https://github.com/FreshRSS/FreshRSS/security/advisories/GHSA-hvrj-5fwj-p7v6\",\"source\":\"security-advisories@github.com\",\"tags\":[\"Third Party Advisory\"]}]}}" } }
Loading...
Loading...
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.