Vulnerability Details : CVE-2022-23497
FreshRSS is a free, self-hostable RSS aggregator. User configuration files can be accessed by a remote user. In addition to user preferences, such configurations contain hashed passwords (brypt with cost 9, salted) of FreshRSS Web interface. If the API is used, the configuration might contain a hashed password (brypt with cost 9, salted) of the GReader API, and a hashed password (MD5 salted) of the Fever API. Users should update to version 1.20.2 or edge. Users unable to upgrade can apply the patch manually or delete the file `./FreshRSS/p/ext.php`.
Vulnerability category: Information leak
Products affected by CVE-2022-23497
- cpe:2.3:a:freshrss:freshrss:*:*:*:*:*:*:*:*
Exploit prediction scoring system (EPSS) score for CVE-2022-23497
0.28%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 69 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2022-23497
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
7.5
|
HIGH | CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N |
3.9
|
3.6
|
NIST | |
6.5
|
MEDIUM | CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L |
3.9
|
2.5
|
GitHub, Inc. |
CWE ids for CVE-2022-23497
-
The product exposes sensitive information to an actor that is not explicitly authorized to have access to that information.Assigned by: security-advisories@github.com (Primary)
References for CVE-2022-23497
-
https://github.com/FreshRSS/FreshRSS/pull/4928
Security fix in ext.php by Alkarex · Pull Request #4928 · FreshRSS/FreshRSS · GitHubPatch;Third Party Advisory
-
https://github.com/FreshRSS/FreshRSS/releases/tag/1.20.2
Release FreshRSS 1.20.2 · FreshRSS/FreshRSS · GitHubPatch;Third Party Advisory
-
https://github.com/FreshRSS/FreshRSS/security/advisories/GHSA-hvrj-5fwj-p7v6
Insecure file access in ext.php allows exposure of user configuration · Advisory · FreshRSS/FreshRSS · GitHubThird Party Advisory
Jump to