Ecosyste.ms: Advisories
An open API service providing security vulnerability metadata for many open source software ecosystems.
Security Advisories: GSA_kwCzR0hTQS01Znh2LXh4NXAtZzJmds0zEA
Integer Overflow in microweber
Microweber is a new generation CMS with drag and drop. The microweber application allows large characters to insert in the input field "first & last name" which can allow attackers to cause a Denial of Service (DoS) via a crafted HTTP request. The first name & last name input should be limited to 50 characters or max 100 characters
Permalink: https://github.com/advisories/GHSA-5fxv-xx5p-g2fvJSON: https://advisories.ecosyste.ms/api/v1/advisories/GSA_kwCzR0hTQS01Znh2LXh4NXAtZzJmds0zEA
Source: GitHub Advisory Database
Origin: Unspecified
Severity: High
Classification: General
Published: almost 3 years ago
Updated: almost 2 years ago
CVSS Score: 7.2
CVSS vector: CVSS:3.0/AV:L/AC:H/PR:H/UI:R/S:C/C:H/I:H/A:H
EPSS Percentage: 0.00076
EPSS Percentile: 0.34522
Identifiers: GHSA-5fxv-xx5p-g2fv, CVE-2022-0968
References:
- https://nvd.nist.gov/vuln/detail/CVE-2022-0968
- https://github.com/microweber/microweber/commit/80e39084729a57dfe749626c3b9d35247a14c49e
- https://huntr.dev/bounties/97e36678-11cf-42c6-889c-892d415d9f9e
- https://github.com/advisories/GHSA-5fxv-xx5p-g2fv
Blast Radius: 5.0
Affected Packages
packagist:microweber/microweber
Dependent packages: 1Dependent repositories: 5
Downloads: 13,089 total
Affected Version Ranges: <= 1.2.11
No known fixed version
All affected versions: 0.9.346, 1.0.3, 1.0.4, 1.0.5, 1.0.6, 1.0.7, 1.2.3, 1.2.4, 1.2.5, 1.2.6, 1.2.7, 1.2.8, 1.2.9, 1.2.10, 1.2.11