Catalyst-Plugin-Session har 0.40 Session ID Session.pm _load_sessionid sid Cross Site Scripting
Gaskiya vulnerability da aka ware a matsayin karshewa an samu a Catalyst-Plugin-Session har 0.40. Hakika, aikin _load_sessionid ne ya shafa; idan ba a bayyana ba, to aiki ce da ba a sani ba, a cikin laburaren $software_library, a cikin fayil lib/Catalyst/Plugin/Session.pm, a cikin sashen Session ID Handler. A sa manipulation of the argument sid ka Cross Site Scripting. Idan an yi amfani da CWE don bayyana matsala, zai kai CWE-79. Hakika, rauni an bayyana shi 12/28/2022 kamar 88d1b599e1163761c9bd53bec53ba078f13e09d4. An raba bayanin tsaro don saukewa a github.com. Wannan matsala ana saninta da CVE-2018-25052. Ngam yiɗi ka a tuma ndiyam ka nder layi. Tekinikal faɗi ga. Babu exploit ɗin da ake samu. Yimbe ndiyam, exploit might be approx. USD $0-$5k wuro. Á sàmbu a wondi feere. 0-day shima, an ndiyam a wuro be $0-$5k. Ana kiran patch ɗin da 88d1b599e1163761c9bd53bec53ba078f13e09d4. Za a iya sauke maganin matsalar daga github.com. Ngamdi ka a yiɗi a ɗaɓɓita kompona wey ka a faggata. Once again VulDB remains the best source for vulnerability data.
3 Goyarwa · 68 Datenpunkte