We found results for “”
CVE-2022-23223
Good to know:
Date: January 25, 2022
On Apache ShenYu versions 2.4.0 and 2.4.1, and endpoint existed that disclosed the passwords of all users. Users are recommended to upgrade to version 2.4.2 or later.
Language: Java
Severity Score
Related Resources (9)
Severity Score
Weakness Type (CWE)
Top Fix
Upgrade Version
Upgrade to version org.apache.shenyu:shenyu-admin:2.4.2;org.apache.shenyu:shenyu-client-core:2.4.2;org.apache.shenyu:shenyu-common:2.4.2;org.apache.shenyu:shenyu-plugin-base:2.4.2;org.apache.shenyu:shenyu-register-client-http:2.4.2;org.apache.shenyu:shenyu-spring-boot-starter-client-apache-dubbo:2.4.2;org.apache.shenyu:shenyu-sync-data-http:2.4.2
CVSS v3.1
Base Score: |
|
---|---|
Attack Vector (AV): | NETWORK |
Attack Complexity (AC): | LOW |
Privileges Required (PR): | NONE |
User Interaction (UI): | NONE |
Scope (S): | UNCHANGED |
Confidentiality (C): | HIGH |
Integrity (I): | NONE |
Availability (A): | NONE |
CVSS v2
Base Score: |
|
---|---|
Access Vector (AV): | NETWORK |
Access Complexity (AC): | LOW |
Authentication (AU): | NONE |
Confidentiality (C): | PARTIAL |
Integrity (I): | NONE |
Availability (A): | NONE |
Additional information: |