Vulnerability Details : CVE-2022-23602
Potential exploit
Nimforum is a lightweight alternative to Discourse written in Nim. In versions prior to 2.2.0 any forum user can create a new thread/post with an include referencing a file local to the host operating system. Nimforum will render the file if able. This can also be done silently by using NimForum's post "preview" endpoint. Even if NimForum is running as a non-critical user, the forum.json secrets can be stolen. Version 2.2.0 of NimForum includes patches for this vulnerability. Users are advised to upgrade as soon as is possible. There are no known workarounds for this issue.
Products affected by CVE-2022-23602
- cpe:2.3:a:nim-lang:docutils:*:*:*:*:*:nim:*:*
- cpe:2.3:a:nim-lang:nimforum:*:*:*:*:*:nim:*:*
Exploit prediction scoring system (EPSS) score for CVE-2022-23602
0.37%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 56 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2022-23602
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
5.5
|
MEDIUM | AV:N/AC:L/Au:S/C:P/I:P/A:N |
8.0
|
4.9
|
NIST | |
8.1
|
HIGH | CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N |
2.8
|
5.2
|
NIST | |
7.7
|
HIGH | CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N |
3.1
|
4.0
|
GitHub, Inc. |
CWE ids for CVE-2022-23602
-
The product uses external input to construct a pathname that is intended to identify a file or directory that is located underneath a restricted parent directory, but the product does not properly neutralize special elements within the pathname that can cause the pathname to resolve to a location that is outside of the restricted directory.Assigned by:
- 134c704f-9b21-4f2e-91b3-4a467353bcc0 (Secondary)
- nvd@nist.gov (Primary)
-
When an actor claims to have a given identity, the product does not prove or insufficiently proves that the claim is correct.Assigned by: nvd@nist.gov (Primary)
References for CVE-2022-23602
-
https://github.com/nim-lang/nimforum/security/advisories/GHSA-q3vh-x957-wr75
Nim's rst parser sandboxed mode allows include which can embed any local file · Advisory · nim-lang/nimforum · GitHubExploit;Patch;Third Party Advisory
-
https://github.com/nim-lang/Nim/commit/cb894c7094fb49014f85815a9dafc38b5dda743e
Merge pull request from GHSA-ggrq-h43f-3w7m · nim-lang/Nim@cb894c7 · GitHubPatch;Third Party Advisory
Jump to