super-xray is a web vulnerability scanning tool. Versions prior to 0.7 assumed trusted input for the program config which is stored in a yaml file. An attacker with local access to the file could exploit this and compromise the program. This issue has been addressed in commit `4d0d5966` and will be included in future releases. Users are advised to upgrade. There are no known workarounds for this issue.
References
Link | Resource |
---|---|
https://github.com/4ra1n/super-xray/commit/4d0d59663596db03f39d7edd2be251d48b52dcfc | Patch Third Party Advisory |
https://github.com/4ra1n/super-xray/security/advisories/GHSA-39pv-4vmj-c4fr | Exploit Third Party Advisory |
History
No history.
MITRE Information
Status: PUBLISHED
Assigner: GitHub_M
Published: 2022-11-25T00:00:00
Updated: 2022-11-25T00:00:00
Reserved: 2022-09-30T00:00:00
Link: CVE-2022-41958
JSON object: View
NVD Information
Status : Analyzed
Published: 2022-11-25T18:15:11.177
Modified: 2022-11-30T20:16:37.313
Link: CVE-2022-41958
JSON object: View
Redhat Information
No data.
CWE