Vulnerability Description
The validate JSON endpoint of the Secvisogram csaf-validator-service in versions < 0.1.0 processes tests with unexpected names. This insufficient input validation of requests by an unauthenticated remote user might lead to a partial DoS of the service. Only the request of the attacker is affected by this vulnerability.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Csaf-Validator-Lib Project | Csaf-Validator-Lib | < 0.1.0 |
Related Weaknesses (CWE)
References
- https://wid.cert-bund.de/.well-known/csaf/white/2022/bsi-2022-0004.jsonThird Party Advisory
- https://wid.cert-bund.de/.well-known/csaf/white/2022/bsi-2022-0004.jsonThird Party Advisory
FAQ
What is CVE-2022-47925?
CVE-2022-47925 is a vulnerability with a CVSS score of 7.5 (HIGH). The validate JSON endpoint of the Secvisogram csaf-validator-service in versions < 0.1.0 processes tests with unexpected names. This insufficient input validation of requests by an unauthenticated rem...
How severe is CVE-2022-47925?
CVE-2022-47925 has been rated HIGH with a CVSS base score of 7.5/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2022-47925?
Check the references section above for vendor advisories and patch information. Affected products include: Csaf-Validator-Lib Project Csaf-Validator-Lib.