Vulnerability Description
Allowing long password leads to denial of service in polonel/trudesk in GitHub repository polonel/trudesk prior to 1.2.2. This vulnerability can be abused by doing a DDoS attack for which genuine users will not able to access resources/applications.
CVSS Score
MEDIUM
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Trudesk Project | Trudesk | < 1.2.2 |
Related Weaknesses (CWE)
References
- https://github.com/polonel/trudesk/commit/e836d04d16787c2c9c72e7bf011cf396d1f73cPatchThird Party Advisory
- https://huntr.dev/bounties/3c6cb129-6995-4722-81b5-af052572b519ExploitThird Party Advisory
- https://github.com/polonel/trudesk/commit/e836d04d16787c2c9c72e7bf011cf396d1f73cPatchThird Party Advisory
- https://huntr.dev/bounties/3c6cb129-6995-4722-81b5-af052572b519ExploitThird Party Advisory
FAQ
What is CVE-2022-1728?
CVE-2022-1728 is a vulnerability with a CVSS score of 6.5 (MEDIUM). Allowing long password leads to denial of service in polonel/trudesk in GitHub repository polonel/trudesk prior to 1.2.2. This vulnerability can be abused by doing a DDoS attack for which genuine user...
How severe is CVE-2022-1728?
CVE-2022-1728 has been rated MEDIUM with a CVSS base score of 6.5/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2022-1728?
Check the references section above for vendor advisories and patch information. Affected products include: Trudesk Project Trudesk.