Vulnerability Description
Authorization Bypass Through User-Controlled Key in GitHub repository ionicabizau/parse-path prior to 5.0.0.
CVSS Score
7.3
HIGH
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Parse-Path Project | Parse-Path | < 5.0.0 |
Related Weaknesses (CWE)
References
- https://github.com/ionicabizau/parse-path/commit/f9ad8856a3c8ae18e1cf4caef5edbabPatchThird Party Advisory
- https://huntr.dev/bounties/afffb2bd-fb06-4144-829e-ecbbcbc85388ExploitPatchThird Party Advisory
- https://github.com/ionicabizau/parse-path/commit/f9ad8856a3c8ae18e1cf4caef5edbabPatchThird Party Advisory
- https://huntr.dev/bounties/afffb2bd-fb06-4144-829e-ecbbcbc85388ExploitPatchThird Party Advisory
FAQ
What is CVE-2022-0624?
CVE-2022-0624 is a vulnerability with a CVSS score of 7.3 (HIGH). Authorization Bypass Through User-Controlled Key in GitHub repository ionicabizau/parse-path prior to 5.0.0.
How severe is CVE-2022-0624?
CVE-2022-0624 has been rated HIGH with a CVSS base score of 7.3/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2022-0624?
Check the references section above for vendor advisories and patch information. Affected products include: Parse-Path Project Parse-Path.