Vulnerability Description
Cross-Site Request Forgery (CSRF) in GitHub repository froxlor/froxlor prior to 0.10.38.
CVSS Score
6.5
MEDIUM
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Froxlor | Froxlor | < 0.10.38 |
Related Weaknesses (CWE)
References
- https://github.com/froxlor/froxlor/commit/bbe82286aae21328668f24857995a67598fe97PatchThird Party Advisory
- https://huntr.dev/bounties/5250c4b1-132b-4da6-9bd6-db36cb56bea0ExploitPatchThird Party Advisory
- https://github.com/froxlor/froxlor/commit/bbe82286aae21328668f24857995a67598fe97PatchThird Party Advisory
- https://huntr.dev/bounties/5250c4b1-132b-4da6-9bd6-db36cb56bea0ExploitPatchThird Party Advisory
FAQ
What is CVE-2022-3017?
CVE-2022-3017 is a vulnerability with a CVSS score of 6.5 (MEDIUM). Cross-Site Request Forgery (CSRF) in GitHub repository froxlor/froxlor prior to 0.10.38.
How severe is CVE-2022-3017?
CVE-2022-3017 has been rated MEDIUM with a CVSS base score of 6.5/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2022-3017?
Check the references section above for vendor advisories and patch information. Affected products include: Froxlor Froxlor.