Vulnerability Details : CVE-2022-32320
A Cross-Site Request Forgery (CSRF) in Ferdi through 5.8.1 and Ferdium through 6.0.0-nightly.98 allows attackers to read files via an uploaded file such as a settings/preferences file.
Vulnerability category: Cross-site request forgery (CSRF)
Products affected by CVE-2022-32320
- cpe:2.3:a:getferdi:ferdi:*:*:*:*:*:*:*:*
- cpe:2.3:a:ferdium:ferdium:6.0.0:nightly98:*:*:*:*:*:*
- cpe:2.3:a:ferdium:ferdium:6.0.0:nightly97:*:*:*:*:*:*
- cpe:2.3:a:ferdium:ferdium:6.0.0:nightly96:*:*:*:*:*:*
- cpe:2.3:a:ferdium:ferdium:6.0.0:nightly95:*:*:*:*:*:*
- cpe:2.3:a:ferdium:ferdium:6.0.0:nightly94:*:*:*:*:*:*
- cpe:2.3:a:ferdium:ferdium:6.0.0:beta3:*:*:*:*:*:*
- cpe:2.3:a:ferdium:ferdium:6.0.0:nightly93:*:*:*:*:*:*
- cpe:2.3:a:ferdium:ferdium:6.0.0:nightly92:*:*:*:*:*:*
- cpe:2.3:a:ferdium:ferdium:6.0.0:nightly91:*:*:*:*:*:*
- cpe:2.3:a:ferdium:ferdium:6.0.0:nightly90:*:*:*:*:*:*
- cpe:2.3:a:ferdium:ferdium:6.0.0:nightly89:*:*:*:*:*:*
- cpe:2.3:a:ferdium:ferdium:6.0.0:nightly88:*:*:*:*:*:*
- cpe:2.3:a:ferdium:ferdium:6.0.0:nightly87:*:*:*:*:*:*
- cpe:2.3:a:ferdium:ferdium:6.0.0:nightly86:*:*:*:*:*:*
- cpe:2.3:a:ferdium:ferdium:6.0.0:nightly85:*:*:*:*:*:*
- cpe:2.3:a:ferdium:ferdium:6.0.0:nightly84:*:*:*:*:*:*
- cpe:2.3:a:ferdium:ferdium:6.0.0:nightly83:*:*:*:*:*:*
- cpe:2.3:a:ferdium:ferdium:6.0.0:nightly82:*:*:*:*:*:*
- cpe:2.3:a:ferdium:ferdium:6.0.0:nightly81:*:*:*:*:*:*
- cpe:2.3:a:ferdium:ferdium:6.0.0:nightly80:*:*:*:*:*:*
- cpe:2.3:a:ferdium:ferdium:6.0.0:nightly79:*:*:*:*:*:*
- cpe:2.3:a:ferdium:ferdium:6.0.0:nightly78:*:*:*:*:*:*
- cpe:2.3:a:ferdium:ferdium:6.0.0:nightly76:*:*:*:*:*:*
- cpe:2.3:a:ferdium:ferdium:6.0.0:nightly77:*:*:*:*:*:*
- cpe:2.3:a:ferdium:ferdium:6.0.0:nightly74:*:*:*:*:*:*
- cpe:2.3:a:ferdium:ferdium:6.0.0:nightly73:*:*:*:*:*:*
- cpe:2.3:a:ferdium:ferdium:6.0.0:nightly72:*:*:*:*:*:*
- cpe:2.3:a:ferdium:ferdium:6.0.0:nightly71:*:*:*:*:*:*
- cpe:2.3:a:ferdium:ferdium:6.0.0:nightly70:*:*:*:*:*:*
- cpe:2.3:a:ferdium:ferdium:6.0.0:beta2:*:*:*:*:*:*
- cpe:2.3:a:ferdium:ferdium:6.0.0:nightly69:*:*:*:*:*:*
- cpe:2.3:a:ferdium:ferdium:6.0.0:nightly67:*:*:*:*:*:*
- cpe:2.3:a:ferdium:ferdium:6.0.0:nightly66:*:*:*:*:*:*
- cpe:2.3:a:ferdium:ferdium:6.0.0:nightly65:*:*:*:*:*:*
- cpe:2.3:a:ferdium:ferdium:6.0.0:nightly63:*:*:*:*:*:*
- cpe:2.3:a:ferdium:ferdium:6.0.0:nightly62:*:*:*:*:*:*
- cpe:2.3:a:ferdium:ferdium:6.0.0:nightly61:*:*:*:*:*:*
- cpe:2.3:a:ferdium:ferdium:6.0.0:nightly60:*:*:*:*:*:*
- cpe:2.3:a:ferdium:ferdium:6.0.0:nightly59:*:*:*:*:*:*
- cpe:2.3:a:ferdium:ferdium:6.0.0:nightly58:*:*:*:*:*:*
- cpe:2.3:a:ferdium:ferdium:6.0.0:nightly57:*:*:*:*:*:*
- cpe:2.3:a:ferdium:ferdium:6.0.0:nightly56:*:*:*:*:*:*
- cpe:2.3:a:ferdium:ferdium:6.0.0:nightly55:*:*:*:*:*:*
- cpe:2.3:a:ferdium:ferdium:6.0.0:nightly54:*:*:*:*:*:*
- cpe:2.3:a:ferdium:ferdium:6.0.0:nightly53:*:*:*:*:*:*
- cpe:2.3:a:ferdium:ferdium:6.0.0:nightly52:*:*:*:*:*:*
- cpe:2.3:a:ferdium:ferdium:6.0.0:nightly51:*:*:*:*:*:*
- cpe:2.3:a:ferdium:ferdium:6.0.0:nightly50:*:*:*:*:*:*
- cpe:2.3:a:ferdium:ferdium:6.0.0:nightly49:*:*:*:*:*:*
- cpe:2.3:a:ferdium:ferdium:6.0.0:nightly48:*:*:*:*:*:*
- cpe:2.3:a:ferdium:ferdium:6.0.0:beta1:*:*:*:*:*:*
- cpe:2.3:a:ferdium:ferdium:6.0.0:nightly47:*:*:*:*:*:*
- cpe:2.3:a:ferdium:ferdium:6.0.0:nightly46:*:*:*:*:*:*
- cpe:2.3:a:ferdium:ferdium:6.0.0:nightly45:*:*:*:*:*:*
- cpe:2.3:a:ferdium:ferdium:6.0.0:nightly44:*:*:*:*:*:*
- cpe:2.3:a:ferdium:ferdium:6.0.0:nightly43:*:*:*:*:*:*
- cpe:2.3:a:ferdium:ferdium:6.0.0:nightly42:*:*:*:*:*:*
- cpe:2.3:a:ferdium:ferdium:6.0.0:nightly41:*:*:*:*:*:*
- cpe:2.3:a:ferdium:ferdium:6.0.0:nightly40:*:*:*:*:*:*
- cpe:2.3:a:ferdium:ferdium:6.0.0:nightly39:*:*:*:*:*:*
- cpe:2.3:a:ferdium:ferdium:6.0.0:nightly38:*:*:*:*:*:*
- cpe:2.3:a:ferdium:ferdium:6.0.0:nightly37:*:*:*:*:*:*
- cpe:2.3:a:ferdium:ferdium:6.0.0:-:*:*:*:*:*:*
- cpe:2.3:a:ferdium:ferdium:6.0.0:nightly36:*:*:*:*:*:*
- cpe:2.3:a:ferdium:ferdium:6.0.0:nightly35:*:*:*:*:*:*
- cpe:2.3:a:ferdium:ferdium:6.0.0:nightly34:*:*:*:*:*:*
- cpe:2.3:a:ferdium:ferdium:6.0.0:nightly33:*:*:*:*:*:*
- cpe:2.3:a:ferdium:ferdium:6.0.0:nightly32:*:*:*:*:*:*
- cpe:2.3:a:ferdium:ferdium:6.0.0:nightly31:*:*:*:*:*:*
- cpe:2.3:a:ferdium:ferdium:6.0.0:nightly30:*:*:*:*:*:*
- cpe:2.3:a:ferdium:ferdium:6.0.0:nightly29:*:*:*:*:*:*
- cpe:2.3:a:ferdium:ferdium:6.0.0:nightly28:*:*:*:*:*:*
- cpe:2.3:a:ferdium:ferdium:6.0.0:nightly27:*:*:*:*:*:*
- cpe:2.3:a:ferdium:ferdium:6.0.0:nightly26:*:*:*:*:*:*
- cpe:2.3:a:ferdium:ferdium:6.0.0:nightly25:*:*:*:*:*:*
- cpe:2.3:a:ferdium:ferdium:6.0.0:nightly24:*:*:*:*:*:*
- cpe:2.3:a:ferdium:ferdium:6.0.0:nightly23:*:*:*:*:*:*
- cpe:2.3:a:ferdium:ferdium:6.0.0:nightly22:*:*:*:*:*:*
- cpe:2.3:a:ferdium:ferdium:6.0.0:nightly21:*:*:*:*:*:*
- cpe:2.3:a:ferdium:ferdium:6.0.0:nightly20:*:*:*:*:*:*
- cpe:2.3:a:ferdium:ferdium:6.0.0:nightly19:*:*:*:*:*:*
- cpe:2.3:a:ferdium:ferdium:6.0.0:nightly18:*:*:*:*:*:*
- cpe:2.3:a:ferdium:ferdium:6.0.0:nightly17:*:*:*:*:*:*
- cpe:2.3:a:ferdium:ferdium:6.0.0:nightly16:*:*:*:*:*:*
- cpe:2.3:a:ferdium:ferdium:6.0.0:nightly15:*:*:*:*:*:*
- cpe:2.3:a:ferdium:ferdium:6.0.0:nightly14:*:*:*:*:*:*
- cpe:2.3:a:ferdium:ferdium:6.0.0:nightly13:*:*:*:*:*:*
- cpe:2.3:a:ferdium:ferdium:6.0.0:nightly12:*:*:*:*:*:*
- cpe:2.3:a:ferdium:ferdium:6.0.0:nightly11:*:*:*:*:*:*
- cpe:2.3:a:ferdium:ferdium:6.0.0:nightly10:*:*:*:*:*:*
- cpe:2.3:a:ferdium:ferdium:6.0.0:nightly9:*:*:*:*:*:*
- cpe:2.3:a:ferdium:ferdium:6.0.0:nightly8:*:*:*:*:*:*
- cpe:2.3:a:ferdium:ferdium:6.0.0:nightly7:*:*:*:*:*:*
- cpe:2.3:a:ferdium:ferdium:6.0.0:nightly6:*:*:*:*:*:*
- cpe:2.3:a:ferdium:ferdium:6.0.0:nightly5:*:*:*:*:*:*
- cpe:2.3:a:ferdium:ferdium:6.0.0:nightly4:*:*:*:*:*:*
- cpe:2.3:a:ferdium:ferdium:6.0.0:nightly3:*:*:*:*:*:*
- cpe:2.3:a:ferdium:ferdium:6.0.0:nightly2:*:*:*:*:*:*
- cpe:2.3:a:ferdium:ferdium:6.0.0:nightly1:*:*:*:*:*:*
Exploit prediction scoring system (EPSS) score for CVE-2022-32320
0.11%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 27 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2022-32320
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
8.8
|
HIGH | CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H |
2.8
|
5.9
|
NIST |
CWE ids for CVE-2022-32320
-
The web application does not, or cannot, sufficiently verify whether a request was intentionally provided by the user who sent the request, which could have originated from an unauthorized actor.Assigned by: nvd@nist.gov (Primary)
References for CVE-2022-32320
-
https://gist.github.com/omriinbar-cyesec/c1179fe99725d2b828b6573c0d110c9c
Ferdi Vulnerability · GitHubThird Party Advisory
-
https://getferdi.com/
FerdiProduct
-
https://github.com/getferdi/ferdi
GitHub - getferdi/ferdi: 🧔🏽 Ferdi helps you organize how you use your favourite apps by combining them into one applicationThird Party Advisory
Jump to