Vulnerability Description
lockss-daemon (aka Classic LOCKSS Daemon) before 1.77.3 performs post-Unicode normalization, which may allow bypass of intended access restrictions, such as when U+1FEF is converted to a backtick.
CVSS Score
MEDIUM
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Lockss | Classic Lockss Daemon | < 1.77.3 |
Related Weaknesses (CWE)
References
- https://github.com/lockss/lockss-daemon/security/advisories/GHSA-mgqj-hphf-9588ExploitVendor Advisory
- https://github.com/lockss/lockss-daemon/security/advisories/GHSA-mgqj-hphf-9588ExploitVendor Advisory
FAQ
What is CVE-2023-42183?
CVE-2023-42183 is a vulnerability with a CVSS score of 5.3 (MEDIUM). lockss-daemon (aka Classic LOCKSS Daemon) before 1.77.3 performs post-Unicode normalization, which may allow bypass of intended access restrictions, such as when U+1FEF is converted to a backtick.
How severe is CVE-2023-42183?
CVE-2023-42183 has been rated MEDIUM with a CVSS base score of 5.3/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2023-42183?
Check the references section above for vendor advisories and patch information. Affected products include: Lockss Classic Lockss Daemon.