Vulnerability Description
Improper handling of Length parameter in GitHub repository erudika/scoold prior to 1.49.4. When the text size is large enough the service results in a momentary outage in a production environment. That can lead to memory corruption on the server.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Erudika | Scoold | < 1.49.4 |
Related Weaknesses (CWE)
References
- https://github.com/erudika/scoold/commit/62a0e92e1486ddc17676a7ead2c07ff653d167cPatchThird Party Advisory
- https://huntr.dev/bounties/9889d435-3b9c-4e9d-93bc-5272e0723f9fExploitThird Party Advisory
- https://github.com/erudika/scoold/commit/62a0e92e1486ddc17676a7ead2c07ff653d167cPatchThird Party Advisory
- https://huntr.dev/bounties/9889d435-3b9c-4e9d-93bc-5272e0723f9fExploitThird Party Advisory
FAQ
What is CVE-2022-1543?
CVE-2022-1543 is a vulnerability with a CVSS score of 8.8 (HIGH). Improper handling of Length parameter in GitHub repository erudika/scoold prior to 1.49.4. When the text size is large enough the service results in a momentary outage in a production environment. Tha...
How severe is CVE-2022-1543?
CVE-2022-1543 has been rated HIGH with a CVSS base score of 8.8/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2022-1543?
Check the references section above for vendor advisories and patch information. Affected products include: Erudika Scoold.