Vulnerability Description
A Cross-Site Request Forgery (CSRF) in Ferdi through 5.8.1 and Ferdium through 6.0.0-nightly.98 allows attackers to read files via an uploaded file such as a settings/preferences file.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Ferdium | Ferdium | 6.0.0 |
| Getferdi | Ferdi | <= 5.8.1 |
Related Weaknesses (CWE)
References
- https://getferdi.com/Product
- https://gist.github.com/omriinbar-cyesec/c1179fe99725d2b828b6573c0d110c9cThird Party Advisory
- https://github.com/getferdi/ferdiThird Party Advisory
- https://getferdi.com/Product
- https://gist.github.com/omriinbar-cyesec/c1179fe99725d2b828b6573c0d110c9cThird Party Advisory
- https://github.com/getferdi/ferdiThird Party Advisory
FAQ
What is CVE-2022-32320?
CVE-2022-32320 is a vulnerability with a CVSS score of 8.8 (HIGH). A Cross-Site Request Forgery (CSRF) in Ferdi through 5.8.1 and Ferdium through 6.0.0-nightly.98 allows attackers to read files via an uploaded file such as a settings/preferences file.
How severe is CVE-2022-32320?
CVE-2022-32320 has been rated HIGH with a CVSS base score of 8.8/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2022-32320?
Check the references section above for vendor advisories and patch information. Affected products include: Ferdium Ferdium, Getferdi Ferdi.