Vulnerability Description
Valinor is a PHP library that helps to map any input into a strongly-typed value object structure. Prior to version 0.12.0, Valinor can use `Throwable#getMessage()` when it should not have permission to do so. This is a problem with cases such as an SQL exception showing an SQL snippet, a database connection exception showing database IP address/username/password, or a timeout detail / out of memory detail. Attackers could use this information for potential data exfiltration, denial of service attacks, enumeration attacks, etc. Version 0.12.0 contains a patch for this vulnerability.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Cuyz | Valinor | < 0.12.0 |
Related Weaknesses (CWE)
References
- https://github.com/CuyZ/Valinor/releases/tag/0.12.0Release NotesThird Party Advisory
- https://github.com/CuyZ/Valinor/security/advisories/GHSA-5pgm-3j3g-2rc7ExploitThird Party Advisory
- https://github.com/CuyZ/Valinor/releases/tag/0.12.0Release NotesThird Party Advisory
- https://github.com/CuyZ/Valinor/security/advisories/GHSA-5pgm-3j3g-2rc7ExploitThird Party Advisory
FAQ
What is CVE-2022-31140?
CVE-2022-31140 is a vulnerability with a CVSS score of 7.5 (HIGH). Valinor is a PHP library that helps to map any input into a strongly-typed value object structure. Prior to version 0.12.0, Valinor can use `Throwable#getMessage()` when it should not have permission ...
How severe is CVE-2022-31140?
CVE-2022-31140 has been rated HIGH with a CVSS base score of 7.5/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2022-31140?
Check the references section above for vendor advisories and patch information. Affected products include: Cuyz Valinor.