Vulnerability Description
A vulnerability has been found in snoyberg keter up to 1.8.1 and classified as problematic. This vulnerability affects unknown code of the file Keter/Proxy.hs. The manipulation of the argument host leads to cross site scripting. The attack can be initiated remotely. Upgrading to version 1.8.2 is able to address this issue. The name of the patch is d41f3697926b231782a3ad8050f5af1ce5cc40b7. It is recommended to upgrade the affected component. The identifier of this vulnerability is VDB-217444.
CVSS Score
LOW
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Keter Project | Keter | < 1.8.2 |
Related Weaknesses (CWE)
References
- https://github.com/snoyberg/keter/commit/d41f3697926b231782a3ad8050f5af1ce5cc40bPatchThird Party Advisory
- https://github.com/snoyberg/keter/pull/246PatchThird Party Advisory
- https://github.com/snoyberg/keter/releases/tag/keter%2F1.8.2Release NotesThird Party Advisory
- https://vuldb.com/?ctiid.217444Third Party Advisory
- https://vuldb.com/?id.217444Third Party Advisory
- https://github.com/snoyberg/keter/commit/d41f3697926b231782a3ad8050f5af1ce5cc40bPatchThird Party Advisory
- https://github.com/snoyberg/keter/pull/246PatchThird Party Advisory
- https://github.com/snoyberg/keter/releases/tag/keter%2F1.8.2Release NotesThird Party Advisory
- https://vuldb.com/?ctiid.217444Third Party Advisory
- https://vuldb.com/?id.217444Third Party Advisory
FAQ
What is CVE-2022-4877?
CVE-2022-4877 is a vulnerability with a CVSS score of 3.5 (LOW). A vulnerability has been found in snoyberg keter up to 1.8.1 and classified as problematic. This vulnerability affects unknown code of the file Keter/Proxy.hs. The manipulation of the argument host le...
How severe is CVE-2022-4877?
CVE-2022-4877 has been rated LOW with a CVSS base score of 3.5/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2022-4877?
Check the references section above for vendor advisories and patch information. Affected products include: Keter Project Keter.