CVE-2022-41958

super-xray is a web vulnerability scanning tool. Versions prior to 0.7 assumed trusted input for the program config which is stored in a yaml file. An attacker with local access to the file could exploit this and compromise the program. This issue has been addressed in commit `4d0d5966` and will be included in future releases. Users are advised to upgrade. There are no known workarounds for this issue.
Configurations

Configuration 1 (hide)

cpe:2.3:a:super_xray_project:super_xray:*:*:*:*:*:*:*:*

History

30 Nov 2022, 20:16

Type Values Removed Values Added
CPE cpe:2.3:a:super_xray_project:super_xray:*:*:*:*:*:*:*:*
First Time Super Xray Project super Xray
Super Xray Project
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 7.8
References (MISC) https://github.com/4ra1n/super-xray/commit/4d0d59663596db03f39d7edd2be251d48b52dcfc - (MISC) https://github.com/4ra1n/super-xray/commit/4d0d59663596db03f39d7edd2be251d48b52dcfc - Patch, Third Party Advisory
References (CONFIRM) https://github.com/4ra1n/super-xray/security/advisories/GHSA-39pv-4vmj-c4fr - (CONFIRM) https://github.com/4ra1n/super-xray/security/advisories/GHSA-39pv-4vmj-c4fr - Exploit, Third Party Advisory

25 Nov 2022, 18:42

Type Values Removed Values Added
New CVE

Information

Published : 2022-11-25 18:15

Updated : 2023-12-10 14:48


NVD link : CVE-2022-41958

Mitre link : CVE-2022-41958

CVE.ORG link : CVE-2022-41958


JSON object : View

Products Affected

super_xray_project

  • super_xray
CWE
CWE-502

Deserialization of Untrusted Data