Vulnerability Description
Gibbon v3.4.4 and below allows attackers to execute a Server-Side Request Forgery (SSRF) via a crafted URL.
CVSS Score
9.8
CRITICAL
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Gibbon Project | Gibbon | < 3.4.4 |
Related Weaknesses (CWE)
References
- https://github.com/amro/gibbon/commit/b2eb99ed304d7491a6d348a5bbdc83a008fc6e0bPatchThird Party Advisory
- https://github.com/amro/gibbon/commit/cade20ca2438cd1b182dad70cbb77fb895779d10PatchThird Party Advisory
- https://github.com/amro/gibbon/pull/321Issue TrackingPatchThird Party Advisory
- https://github.com/amro/gibbon/commit/b2eb99ed304d7491a6d348a5bbdc83a008fc6e0bPatchThird Party Advisory
- https://github.com/amro/gibbon/commit/cade20ca2438cd1b182dad70cbb77fb895779d10PatchThird Party Advisory
- https://github.com/amro/gibbon/pull/321Issue TrackingPatchThird Party Advisory
FAQ
What is CVE-2022-27311?
CVE-2022-27311 is a vulnerability with a CVSS score of 9.8 (CRITICAL). Gibbon v3.4.4 and below allows attackers to execute a Server-Side Request Forgery (SSRF) via a crafted URL.
How severe is CVE-2022-27311?
CVE-2022-27311 has been rated CRITICAL with a CVSS base score of 9.8/10. This is considered a critical vulnerability requiring immediate attention.
Is there a patch for CVE-2022-27311?
Check the references section above for vendor advisories and patch information. Affected products include: Gibbon Project Gibbon.