Description
An high privileged attacker may pass crafted arguments to the validate function of csaf-validator-lib of a locally installed Secvisogram in versions < 0.1.0 wich can result in arbitrary code execution and DoS once the users triggers the validation.
References
https://wid.cert-bund.de/.well-known/csaf/white/2022/bsi-2022-0004.json
Third Party Advisory
CVSS impact metrics
CVSS:3.1/AV:L/AC:L/PR:H/UI:R/S:U/C:H/I:H/A:H
6.5 · Medium
CVSS V3.1
CVSS V3.0
CVSS V2.0
Information
Source identifier
Vulnerability status
Modified
Published
2023-03-27T14:15:07.690
1 year agoLast modified
2023-11-07T03:56:25.683
8 months ago