Vulnerability Description
WsgiDAV is a generic and extendable WebDAV server based on WSGI. Implementations using this library with directory browsing enabled may be susceptible to Cross Site Scripting (XSS) attacks. This issue has been patched, users can upgrade to version 4.1.0. As a workaround, set `dir_browser.enable = False` in the configuration.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Wsgidav Project | Wsgidav | >= 3.0.0, < 4.1.0 |
Related Weaknesses (CWE)
References
- https://github.com/mar10/wsgidav/commit/e9606ab0f42f4c1a6611bc3c52de299b0aba7726PatchThird Party Advisory
- https://github.com/mar10/wsgidav/security/advisories/GHSA-xx6g-jj35-pxjvMitigationThird Party Advisory
- https://github.com/mar10/wsgidav/commit/e9606ab0f42f4c1a6611bc3c52de299b0aba7726PatchThird Party Advisory
- https://github.com/mar10/wsgidav/security/advisories/GHSA-xx6g-jj35-pxjvMitigationThird Party Advisory
FAQ
What is CVE-2022-41905?
CVE-2022-41905 is a vulnerability with a CVSS score of 8.2 (HIGH). WsgiDAV is a generic and extendable WebDAV server based on WSGI. Implementations using this library with directory browsing enabled may be susceptible to Cross Site Scripting (XSS) attacks. This issue...
How severe is CVE-2022-41905?
CVE-2022-41905 has been rated HIGH with a CVSS base score of 8.2/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2022-41905?
Check the references section above for vendor advisories and patch information. Affected products include: Wsgidav Project Wsgidav.