mirror of
https://github.com/fkie-cad/nvd-json-data-feeds.git
synced 2025-06-01 03:01:36 +00:00
308 lines
12 KiB
JSON
308 lines
12 KiB
JSON
{
|
|
"id": "CVE-2023-22465",
|
|
"sourceIdentifier": "security-advisories@github.com",
|
|
"published": "2023-01-04T16:15:09.323",
|
|
"lastModified": "2023-01-11T02:23:37.613",
|
|
"vulnStatus": "Analyzed",
|
|
"descriptions": [
|
|
{
|
|
"lang": "en",
|
|
"value": "Http4s is a Scala interface for HTTP services. Starting with version 0.1.0 and prior to versions 0.21.34, 0.22.15, 0.23.17, and 1.0.0-M38, the `User-Agent` and `Server` header parsers are susceptible to a fatal error on certain inputs. In http4s, modeled headers are lazily parsed, so this only applies to services that explicitly request these typed headers. Fixes are released in 0.21.34, 0.22.15, 0.23.17, and 1.0.0-M38. As a workaround, use the weakly typed header interface."
|
|
}
|
|
],
|
|
"metrics": {
|
|
"cvssMetricV31": [
|
|
{
|
|
"source": "nvd@nist.gov",
|
|
"type": "Primary",
|
|
"cvssData": {
|
|
"version": "3.1",
|
|
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
|
|
"attackVector": "NETWORK",
|
|
"attackComplexity": "LOW",
|
|
"privilegesRequired": "NONE",
|
|
"userInteraction": "NONE",
|
|
"scope": "UNCHANGED",
|
|
"confidentialityImpact": "NONE",
|
|
"integrityImpact": "NONE",
|
|
"availabilityImpact": "LOW",
|
|
"baseScore": 5.3,
|
|
"baseSeverity": "MEDIUM"
|
|
},
|
|
"exploitabilityScore": 3.9,
|
|
"impactScore": 1.4
|
|
},
|
|
{
|
|
"source": "security-advisories@github.com",
|
|
"type": "Secondary",
|
|
"cvssData": {
|
|
"version": "3.1",
|
|
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
|
|
"attackVector": "NETWORK",
|
|
"attackComplexity": "LOW",
|
|
"privilegesRequired": "NONE",
|
|
"userInteraction": "NONE",
|
|
"scope": "UNCHANGED",
|
|
"confidentialityImpact": "NONE",
|
|
"integrityImpact": "NONE",
|
|
"availabilityImpact": "HIGH",
|
|
"baseScore": 7.5,
|
|
"baseSeverity": "HIGH"
|
|
},
|
|
"exploitabilityScore": 3.9,
|
|
"impactScore": 3.6
|
|
}
|
|
]
|
|
},
|
|
"weaknesses": [
|
|
{
|
|
"source": "nvd@nist.gov",
|
|
"type": "Primary",
|
|
"description": [
|
|
{
|
|
"lang": "en",
|
|
"value": "CWE-20"
|
|
}
|
|
]
|
|
},
|
|
{
|
|
"source": "security-advisories@github.com",
|
|
"type": "Secondary",
|
|
"description": [
|
|
{
|
|
"lang": "en",
|
|
"value": "CWE-20"
|
|
}
|
|
]
|
|
}
|
|
],
|
|
"configurations": [
|
|
{
|
|
"nodes": [
|
|
{
|
|
"operator": "OR",
|
|
"negate": false,
|
|
"cpeMatch": [
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:typelevel:http4s:*:*:*:*:*:*:*:*",
|
|
"versionStartIncluding": "0.1.0",
|
|
"versionEndExcluding": "0.21.34",
|
|
"matchCriteriaId": "185B0C49-B7B4-436A-9577-3276FCE1181F"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:typelevel:http4s:*:*:*:*:*:*:*:*",
|
|
"versionStartIncluding": "0.22.0",
|
|
"versionEndExcluding": "0.22.15",
|
|
"matchCriteriaId": "AF811C59-F1EA-49A0-A335-D395AC17EC76"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:typelevel:http4s:*:*:*:*:*:*:*:*",
|
|
"versionStartIncluding": "0.23.0",
|
|
"versionEndExcluding": "0.23.17",
|
|
"matchCriteriaId": "79816BBF-3E40-4E20-8138-281DA5CF65E9"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:typelevel:http4s:1.0.0:milestone1:*:*:*:*:*:*",
|
|
"matchCriteriaId": "65C497F9-281C-4565-BD36-B6B4D7E6F8BD"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:typelevel:http4s:1.0.0:milestone10:*:*:*:*:*:*",
|
|
"matchCriteriaId": "6FCFC3E5-7530-4AAA-A2C7-36DC307B613B"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:typelevel:http4s:1.0.0:milestone11:*:*:*:*:*:*",
|
|
"matchCriteriaId": "D03CBFE3-0B31-4D7C-BC5D-61DCD3C2C486"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:typelevel:http4s:1.0.0:milestone12:*:*:*:*:*:*",
|
|
"matchCriteriaId": "76F8BC53-544C-4285-8D9B-CB91AD080048"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:typelevel:http4s:1.0.0:milestone13:*:*:*:*:*:*",
|
|
"matchCriteriaId": "778947CA-20BA-469F-87E1-97D8713ACC75"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:typelevel:http4s:1.0.0:milestone14:*:*:*:*:*:*",
|
|
"matchCriteriaId": "F5B02828-1E40-49BE-8367-10296625C696"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:typelevel:http4s:1.0.0:milestone15:*:*:*:*:*:*",
|
|
"matchCriteriaId": "A569F32F-3C8C-4F8F-B0BC-6ADC993596A9"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:typelevel:http4s:1.0.0:milestone16:*:*:*:*:*:*",
|
|
"matchCriteriaId": "525DBF4B-F574-459D-9CE2-6AF597ABAE10"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:typelevel:http4s:1.0.0:milestone17:*:*:*:*:*:*",
|
|
"matchCriteriaId": "FD05B15E-1E4F-43EA-B21A-3B96A77814D6"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:typelevel:http4s:1.0.0:milestone18:*:*:*:*:*:*",
|
|
"matchCriteriaId": "65C79F52-F05F-4F0A-AC27-393197B9EF00"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:typelevel:http4s:1.0.0:milestone19:*:*:*:*:*:*",
|
|
"matchCriteriaId": "A426B4C0-643A-492F-B7FB-725549F613F6"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:typelevel:http4s:1.0.0:milestone2:*:*:*:*:*:*",
|
|
"matchCriteriaId": "D95E231C-3D13-45FC-AF9A-CB8CF1FFC983"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:typelevel:http4s:1.0.0:milestone20:*:*:*:*:*:*",
|
|
"matchCriteriaId": "CF973F58-0AC7-4B58-A2CF-654133CE7F1A"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:typelevel:http4s:1.0.0:milestone21:*:*:*:*:*:*",
|
|
"matchCriteriaId": "35C40331-C96C-477C-B6BD-D5506E612DA8"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:typelevel:http4s:1.0.0:milestone22:*:*:*:*:*:*",
|
|
"matchCriteriaId": "615BC827-3E0F-4C1E-8FD2-B59FF31F2D49"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:typelevel:http4s:1.0.0:milestone23:*:*:*:*:*:*",
|
|
"matchCriteriaId": "FDFB35FD-4D08-4895-B1B6-FC03BCB3EB22"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:typelevel:http4s:1.0.0:milestone24:*:*:*:*:*:*",
|
|
"matchCriteriaId": "97F74D04-031E-47D4-BA57-DBE9C74CE256"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:typelevel:http4s:1.0.0:milestone25:*:*:*:*:*:*",
|
|
"matchCriteriaId": "2FDC2E12-DE86-4A82-BD2F-C18F715CA673"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:typelevel:http4s:1.0.0:milestone26:*:*:*:*:*:*",
|
|
"matchCriteriaId": "C1C18467-5FD0-4DCC-8B75-979C03BFF1C4"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:typelevel:http4s:1.0.0:milestone27:*:*:*:*:*:*",
|
|
"matchCriteriaId": "6724B3CF-A393-469B-BA80-CED8AB98358A"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:typelevel:http4s:1.0.0:milestone28:*:*:*:*:*:*",
|
|
"matchCriteriaId": "804EF10D-46A9-49C0-B1C4-74B832115662"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:typelevel:http4s:1.0.0:milestone29:*:*:*:*:*:*",
|
|
"matchCriteriaId": "2DE365D6-17C4-4E82-8F2B-1DA18CC8382F"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:typelevel:http4s:1.0.0:milestone3:*:*:*:*:*:*",
|
|
"matchCriteriaId": "DE093D65-1B3A-4A4A-BC76-05DEF9529712"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:typelevel:http4s:1.0.0:milestone30:*:*:*:*:*:*",
|
|
"matchCriteriaId": "078E27D3-AD80-44E8-A97C-328AEB4E2929"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:typelevel:http4s:1.0.0:milestone31:*:*:*:*:*:*",
|
|
"matchCriteriaId": "548DB4B7-872D-4A7E-9DA7-D0BF15BDE969"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:typelevel:http4s:1.0.0:milestone32:*:*:*:*:*:*",
|
|
"matchCriteriaId": "07037A73-F463-4F8B-8F8B-AF513B31DA21"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:typelevel:http4s:1.0.0:milestone33:*:*:*:*:*:*",
|
|
"matchCriteriaId": "801D2731-BD6D-4CD9-B69F-75DC1A0FE3CD"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:typelevel:http4s:1.0.0:milestone34:*:*:*:*:*:*",
|
|
"matchCriteriaId": "AA2C32F3-93A3-4A2F-9A9A-DC06056EDC81"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:typelevel:http4s:1.0.0:milestone35:*:*:*:*:*:*",
|
|
"matchCriteriaId": "59C3ECBA-47D1-4A9B-8193-8033BC27CC37"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:typelevel:http4s:1.0.0:milestone36:*:*:*:*:*:*",
|
|
"matchCriteriaId": "9B7AF9D4-4548-4D25-84BC-54C525179342"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:typelevel:http4s:1.0.0:milestone37:*:*:*:*:*:*",
|
|
"matchCriteriaId": "0D884D1D-F74D-406F-A363-C008097C997E"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:typelevel:http4s:1.0.0:milestone4:*:*:*:*:*:*",
|
|
"matchCriteriaId": "DC3CA618-148D-4F97-9913-316DDDD97838"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:typelevel:http4s:1.0.0:milestone5:*:*:*:*:*:*",
|
|
"matchCriteriaId": "02FA538C-9D8A-49D5-8268-1A2C3E96B89B"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:typelevel:http4s:1.0.0:milestone6:*:*:*:*:*:*",
|
|
"matchCriteriaId": "D18A3ABC-5C47-45BF-978C-5BB17787DCFA"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:typelevel:http4s:1.0.0:milestone7:*:*:*:*:*:*",
|
|
"matchCriteriaId": "1CE1CF51-E61A-418A-AB22-9D7A6D690BAA"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:typelevel:http4s:1.0.0:milestone8:*:*:*:*:*:*",
|
|
"matchCriteriaId": "29A70AAA-B77A-4291-A700-C910362DB8D4"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:typelevel:http4s:1.0.0:milestone9:*:*:*:*:*:*",
|
|
"matchCriteriaId": "9F8F3C38-57AB-4CBC-8959-7FF51CBA7907"
|
|
}
|
|
]
|
|
}
|
|
]
|
|
}
|
|
],
|
|
"references": [
|
|
{
|
|
"url": "https://github.com/http4s/http4s/security/advisories/GHSA-54w6-vxfh-fw7f",
|
|
"source": "security-advisories@github.com",
|
|
"tags": [
|
|
"Exploit",
|
|
"Mitigation",
|
|
"Third Party Advisory"
|
|
]
|
|
}
|
|
]
|
|
} |