Enhancement: cves/2022/CVE-2022-0968.yaml by md

patch-1
MostInterestingBotInTheWorld 2023-04-06 17:11:32 -04:00
parent 02fe878a38
commit db2041816e
1 changed files with 6 additions and 3 deletions

View File

@ -1,16 +1,17 @@
id: CVE-2022-0968
info:
name: Microweber < 1.2.12 - Integer Overflow (DOS)
name: Microweber <1.2.12 - Integer Overflow
author: amit-jd
severity: medium
description: |
The microweber application allows large characters to insert in the input field "first & last name" which can allow attackers to cause a Denial of Service (DoS) via a crafted HTTP request. The first name & last name input should be limited to 50 characters or max 100 characters.
Microweber before 1.2.12 is susceptible to integer overflow. The application allows large characters to insert in the input field 'first & last name,' which can allow an attacker to cause a denial of service via a crafted HTTP request.
remediation: First name and last name input should be limited to 50 characters or maximum 100 characters.
reference:
- https://huntr.dev/bounties/97e36678-11cf-42c6-889c-892d415d9f9e/
- https://github.com/advisories/GHSA-5fxv-xx5p-g2fv
- https://nvd.nist.gov/vuln/detail/CVE-2022-0968
- https://huntr.dev/bounties/97e36678-11cf-42c6-889c-892d415d9f9e
- https://nvd.nist.gov/vuln/detail/CVE-2022-0968
classification:
cvss-metrics: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
cvss-score: 5.5
@ -75,3 +76,5 @@ requests:
group: 1
regex:
- '<input type="email" class="form-control" name="email" value="(.*)">'
# Enhanced by md on 2023/04/06