All the vulnerabilites related to octoprint - octoprint/octoprint
cve-2022-1432
Vulnerability from cvelistv5
Published
2022-05-18 10:10
Modified
2024-08-03 00:03
Severity ?
EPSS score ?
Summary
Cross-site Scripting (XSS) - Generic in octoprint/octoprint
References
▼ | URL | Tags |
---|---|---|
https://huntr.dev/bounties/cb545c63-a3c1-4d57-8f06-e4593ab389bf | x_refsource_CONFIRM | |
https://github.com/octoprint/octoprint/commit/6d259d7e6f5b0de9a1c762831537a386e53978d3 | x_refsource_MISC |
Impacted products
▼ | Vendor | Product |
---|---|---|
octoprint | octoprint/octoprint |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T00:03:06.351Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://huntr.dev/bounties/cb545c63-a3c1-4d57-8f06-e4593ab389bf" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://github.com/octoprint/octoprint/commit/6d259d7e6f5b0de9a1c762831537a386e53978d3" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "octoprint/octoprint", "vendor": "octoprint", "versions": [ { "lessThan": "1.8.0", "status": "affected", "version": "unspecified", "versionType": "custom" } ] } ], "descriptions": [ { "lang": "en", "value": "Cross-site Scripting (XSS) - Generic in GitHub repository octoprint/octoprint prior to 1.8.0." } ], "metrics": [ { "cvssV3_0": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.0" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-79", "description": "CWE-79 Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2022-05-18T10:10:10", "orgId": "c09c270a-b464-47c1-9133-acb35b22c19a", "shortName": "@huntrdev" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "https://huntr.dev/bounties/cb545c63-a3c1-4d57-8f06-e4593ab389bf" }, { "tags": [ "x_refsource_MISC" ], "url": "https://github.com/octoprint/octoprint/commit/6d259d7e6f5b0de9a1c762831537a386e53978d3" } ], "source": { "advisory": "cb545c63-a3c1-4d57-8f06-e4593ab389bf", "discovery": "EXTERNAL" }, "title": "Cross-site Scripting (XSS) - Generic in octoprint/octoprint", "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "security@huntr.dev", "ID": "CVE-2022-1432", "STATE": "PUBLIC", "TITLE": "Cross-site Scripting (XSS) - Generic in octoprint/octoprint" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "octoprint/octoprint", "version": { "version_data": [ { "version_affected": "\u003c", "version_value": "1.8.0" } ] } } ] }, "vendor_name": "octoprint" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Cross-site Scripting (XSS) - Generic in GitHub repository octoprint/octoprint prior to 1.8.0." } ] }, "impact": { "cvss": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.0" } }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-79 Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)" } ] } ] }, "references": { "reference_data": [ { "name": "https://huntr.dev/bounties/cb545c63-a3c1-4d57-8f06-e4593ab389bf", "refsource": "CONFIRM", "url": "https://huntr.dev/bounties/cb545c63-a3c1-4d57-8f06-e4593ab389bf" }, { "name": "https://github.com/octoprint/octoprint/commit/6d259d7e6f5b0de9a1c762831537a386e53978d3", "refsource": "MISC", "url": "https://github.com/octoprint/octoprint/commit/6d259d7e6f5b0de9a1c762831537a386e53978d3" } ] }, "source": { "advisory": "cb545c63-a3c1-4d57-8f06-e4593ab389bf", "discovery": "EXTERNAL" } } } }, "cveMetadata": { "assignerOrgId": "c09c270a-b464-47c1-9133-acb35b22c19a", "assignerShortName": "@huntrdev", "cveId": "CVE-2022-1432", "datePublished": "2022-05-18T10:10:10", "dateReserved": "2022-04-22T00:00:00", "dateUpdated": "2024-08-03T00:03:06.351Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2022-3068
Vulnerability from cvelistv5
Published
2022-09-21 11:55
Modified
2024-08-03 01:00
Severity ?
EPSS score ?
Summary
Improper Privilege Management in octoprint/octoprint
References
▼ | URL | Tags |
---|---|---|
https://huntr.dev/bounties/f45c24cb-9104-4c6e-a9e1-5c7e75e83884 | x_refsource_CONFIRM | |
https://github.com/octoprint/octoprint/commit/ef95ef1c101b79394f134e8fce000e6bae046571 | x_refsource_MISC |
Impacted products
▼ | Vendor | Product |
---|---|---|
octoprint | octoprint/octoprint |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T01:00:10.462Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://huntr.dev/bounties/f45c24cb-9104-4c6e-a9e1-5c7e75e83884" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://github.com/octoprint/octoprint/commit/ef95ef1c101b79394f134e8fce000e6bae046571" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "octoprint/octoprint", "vendor": "octoprint", "versions": [ { "lessThan": "1.8.3", "status": "affected", "version": "unspecified", "versionType": "custom" } ] } ], "descriptions": [ { "lang": "en", "value": "Improper Privilege Management in GitHub repository octoprint/octoprint prior to 1.8.3." } ], "metrics": [ { "cvssV3_0": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "LOW", "baseScore": 5.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L", "version": "3.0" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-269", "description": "CWE-269 Improper Privilege Management", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2022-09-21T11:55:09", "orgId": "c09c270a-b464-47c1-9133-acb35b22c19a", "shortName": "@huntrdev" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "https://huntr.dev/bounties/f45c24cb-9104-4c6e-a9e1-5c7e75e83884" }, { "tags": [ "x_refsource_MISC" ], "url": "https://github.com/octoprint/octoprint/commit/ef95ef1c101b79394f134e8fce000e6bae046571" } ], "source": { "advisory": "f45c24cb-9104-4c6e-a9e1-5c7e75e83884", "discovery": "EXTERNAL" }, "title": "Improper Privilege Management in octoprint/octoprint", "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "security@huntr.dev", "ID": "CVE-2022-3068", "STATE": "PUBLIC", "TITLE": "Improper Privilege Management in octoprint/octoprint" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "octoprint/octoprint", "version": { "version_data": [ { "version_affected": "\u003c", "version_value": "1.8.3" } ] } } ] }, "vendor_name": "octoprint" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Improper Privilege Management in GitHub repository octoprint/octoprint prior to 1.8.3." } ] }, "impact": { "cvss": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "LOW", "baseScore": 5.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L", "version": "3.0" } }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-269 Improper Privilege Management" } ] } ] }, "references": { "reference_data": [ { "name": "https://huntr.dev/bounties/f45c24cb-9104-4c6e-a9e1-5c7e75e83884", "refsource": "CONFIRM", "url": "https://huntr.dev/bounties/f45c24cb-9104-4c6e-a9e1-5c7e75e83884" }, { "name": "https://github.com/octoprint/octoprint/commit/ef95ef1c101b79394f134e8fce000e6bae046571", "refsource": "MISC", "url": "https://github.com/octoprint/octoprint/commit/ef95ef1c101b79394f134e8fce000e6bae046571" } ] }, "source": { "advisory": "f45c24cb-9104-4c6e-a9e1-5c7e75e83884", "discovery": "EXTERNAL" } } } }, "cveMetadata": { "assignerOrgId": "c09c270a-b464-47c1-9133-acb35b22c19a", "assignerShortName": "@huntrdev", "cveId": "CVE-2022-3068", "datePublished": "2022-09-21T11:55:09", "dateReserved": "2022-08-31T00:00:00", "dateUpdated": "2024-08-03T01:00:10.462Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2022-3607
Vulnerability from cvelistv5
Published
2022-10-19 00:00
Modified
2024-08-03 01:14
Severity ?
EPSS score ?
Summary
Failure to Sanitize Special Elements into a Different Plane (Special Element Injection) in octoprint/octoprint
References
Impacted products
▼ | Vendor | Product |
---|---|---|
octoprint | octoprint/octoprint |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T01:14:03.306Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://huntr.dev/bounties/2d1db3c9-93e8-4902-a55b-5ea53c22aa11" }, { "tags": [ "x_transferred" ], "url": "https://github.com/octoprint/octoprint/commit/3cca3a43f3d085e9bbe5a5840c8255bb1b5d052e" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "octoprint/octoprint", "vendor": "octoprint", "versions": [ { "lessThan": "1.8.3", "status": "affected", "version": "unspecified", "versionType": "custom" } ] } ], "descriptions": [ { "lang": "en", "value": "Failure to Sanitize Special Elements into a Different Plane (Special Element Injection) in GitHub repository octoprint/octoprint prior to 1.8.3." } ], "metrics": [ { "cvssV3_0": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 6, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "HIGH", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:N/A:N", "version": "3.0" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-75", "description": "CWE-75 Failure to Sanitize Special Elements into a Different Plane (Special Element Injection)", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2022-10-19T00:00:00", "orgId": "c09c270a-b464-47c1-9133-acb35b22c19a", "shortName": "@huntrdev" }, "references": [ { "url": "https://huntr.dev/bounties/2d1db3c9-93e8-4902-a55b-5ea53c22aa11" }, { "url": "https://github.com/octoprint/octoprint/commit/3cca3a43f3d085e9bbe5a5840c8255bb1b5d052e" } ], "source": { "advisory": "2d1db3c9-93e8-4902-a55b-5ea53c22aa11", "discovery": "EXTERNAL" }, "title": "Failure to Sanitize Special Elements into a Different Plane (Special Element Injection) in octoprint/octoprint" } }, "cveMetadata": { "assignerOrgId": "c09c270a-b464-47c1-9133-acb35b22c19a", "assignerShortName": "@huntrdev", "cveId": "CVE-2022-3607", "datePublished": "2022-10-19T00:00:00", "dateReserved": "2022-10-19T00:00:00", "dateUpdated": "2024-08-03T01:14:03.306Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2022-2822
Vulnerability from cvelistv5
Published
2022-08-15 10:30
Modified
2024-08-03 00:52
Severity ?
EPSS score ?
Summary
Authentication Bypass by Primary Weakness in octoprint/octoprint
References
▼ | URL | Tags |
---|---|---|
https://huntr.dev/bounties/6369f355-e6ef-4469-af75-0f6ff00cde3d | x_refsource_CONFIRM | |
https://github.com/octoprint/octoprint/commit/82c892ba40b3741d1b7711d949e56af64f5bc2de | x_refsource_MISC |
Impacted products
▼ | Vendor | Product |
---|---|---|
octoprint | octoprint/octoprint |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T00:52:58.435Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://huntr.dev/bounties/6369f355-e6ef-4469-af75-0f6ff00cde3d" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://github.com/octoprint/octoprint/commit/82c892ba40b3741d1b7711d949e56af64f5bc2de" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "octoprint/octoprint", "vendor": "octoprint", "versions": [ { "lessThan": "1.9.0", "status": "affected", "version": "unspecified", "versionType": "custom" } ] } ], "descriptions": [ { "lang": "en", "value": "An attacker can freely brute force username and password and can takeover any account. An attacker could easily guess user passwords and gain access to user and administrative accounts." } ], "metrics": [ { "cvssV3_0": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 3.7, "baseSeverity": "LOW", "confidentialityImpact": "LOW", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N", "version": "3.0" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-307", "description": "CWE-307 Improper Restriction of Excessive Authentication Attempts", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2022-08-15T10:40:09", "orgId": "c09c270a-b464-47c1-9133-acb35b22c19a", "shortName": "@huntrdev" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "https://huntr.dev/bounties/6369f355-e6ef-4469-af75-0f6ff00cde3d" }, { "tags": [ "x_refsource_MISC" ], "url": "https://github.com/octoprint/octoprint/commit/82c892ba40b3741d1b7711d949e56af64f5bc2de" } ], "source": { "advisory": "6369f355-e6ef-4469-af75-0f6ff00cde3d", "discovery": "EXTERNAL" }, "title": "Authentication Bypass by Primary Weakness in octoprint/octoprint", "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "security@huntr.dev", "ID": "CVE-2022-2822", "STATE": "PUBLIC", "TITLE": "Authentication Bypass by Primary Weakness in octoprint/octoprint" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "octoprint/octoprint", "version": { "version_data": [ { "version_affected": "\u003c", "version_value": "1.9.0" } ] } } ] }, "vendor_name": "octoprint" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "An attacker can freely brute force username and password and can takeover any account. An attacker could easily guess user passwords and gain access to user and administrative accounts." } ] }, "impact": { "cvss": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 3.7, "baseSeverity": "LOW", "confidentialityImpact": "LOW", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N", "version": "3.0" } }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-307 Improper Restriction of Excessive Authentication Attempts" } ] } ] }, "references": { "reference_data": [ { "name": "https://huntr.dev/bounties/6369f355-e6ef-4469-af75-0f6ff00cde3d", "refsource": "CONFIRM", "url": "https://huntr.dev/bounties/6369f355-e6ef-4469-af75-0f6ff00cde3d" }, { "name": "https://github.com/octoprint/octoprint/commit/82c892ba40b3741d1b7711d949e56af64f5bc2de", "refsource": "MISC", "url": "https://github.com/octoprint/octoprint/commit/82c892ba40b3741d1b7711d949e56af64f5bc2de" } ] }, "source": { "advisory": "6369f355-e6ef-4469-af75-0f6ff00cde3d", "discovery": "EXTERNAL" } } } }, "cveMetadata": { "assignerOrgId": "c09c270a-b464-47c1-9133-acb35b22c19a", "assignerShortName": "@huntrdev", "cveId": "CVE-2022-2822", "datePublished": "2022-08-15T10:30:17", "dateReserved": "2022-08-15T00:00:00", "dateUpdated": "2024-08-03T00:52:58.435Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2022-2888
Vulnerability from cvelistv5
Published
2022-09-21 11:25
Modified
2024-08-03 00:52
Severity ?
EPSS score ?
Summary
Insufficient Session Expiration in octoprint/octoprint
References
▼ | URL | Tags |
---|---|---|
https://huntr.dev/bounties/d27d232b-2578-4b32-b3b4-74aabdadf629 | x_refsource_CONFIRM | |
https://github.com/octoprint/octoprint/commit/40e6217ac1a85cc5ed592873ae49db01d3005da4 | x_refsource_MISC |
Impacted products
▼ | Vendor | Product |
---|---|---|
octoprint | octoprint/octoprint |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T00:52:59.606Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://huntr.dev/bounties/d27d232b-2578-4b32-b3b4-74aabdadf629" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://github.com/octoprint/octoprint/commit/40e6217ac1a85cc5ed592873ae49db01d3005da4" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "octoprint/octoprint", "vendor": "octoprint", "versions": [ { "lessThan": "1.8.3", "status": "affected", "version": "unspecified", "versionType": "custom" } ] } ], "descriptions": [ { "lang": "en", "value": "If an attacker comes into the possession of a victim\u0027s OctoPrint session cookie through whatever means, the attacker can use this cookie to authenticate as long as the victim\u0027s account exists." } ], "metrics": [ { "cvssV3_0": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 4.4, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N", "version": "3.0" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-613", "description": "CWE-613 Insufficient Session Expiration", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2022-09-21T11:25:08", "orgId": "c09c270a-b464-47c1-9133-acb35b22c19a", "shortName": "@huntrdev" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "https://huntr.dev/bounties/d27d232b-2578-4b32-b3b4-74aabdadf629" }, { "tags": [ "x_refsource_MISC" ], "url": "https://github.com/octoprint/octoprint/commit/40e6217ac1a85cc5ed592873ae49db01d3005da4" } ], "source": { "advisory": "d27d232b-2578-4b32-b3b4-74aabdadf629", "discovery": "EXTERNAL" }, "title": "Insufficient Session Expiration in octoprint/octoprint", "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "security@huntr.dev", "ID": "CVE-2022-2888", "STATE": "PUBLIC", "TITLE": "Insufficient Session Expiration in octoprint/octoprint" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "octoprint/octoprint", "version": { "version_data": [ { "version_affected": "\u003c", "version_value": "1.8.3" } ] } } ] }, "vendor_name": "octoprint" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "If an attacker comes into the possession of a victim\u0027s OctoPrint session cookie through whatever means, the attacker can use this cookie to authenticate as long as the victim\u0027s account exists." } ] }, "impact": { "cvss": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 4.4, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N", "version": "3.0" } }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-613 Insufficient Session Expiration" } ] } ] }, "references": { "reference_data": [ { "name": "https://huntr.dev/bounties/d27d232b-2578-4b32-b3b4-74aabdadf629", "refsource": "CONFIRM", "url": "https://huntr.dev/bounties/d27d232b-2578-4b32-b3b4-74aabdadf629" }, { "name": "https://github.com/octoprint/octoprint/commit/40e6217ac1a85cc5ed592873ae49db01d3005da4", "refsource": "MISC", "url": "https://github.com/octoprint/octoprint/commit/40e6217ac1a85cc5ed592873ae49db01d3005da4" } ] }, "source": { "advisory": "d27d232b-2578-4b32-b3b4-74aabdadf629", "discovery": "EXTERNAL" } } } }, "cveMetadata": { "assignerOrgId": "c09c270a-b464-47c1-9133-acb35b22c19a", "assignerShortName": "@huntrdev", "cveId": "CVE-2022-2888", "datePublished": "2022-09-21T11:25:08", "dateReserved": "2022-08-18T00:00:00", "dateUpdated": "2024-08-03T00:52:59.606Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2022-2872
Vulnerability from cvelistv5
Published
2022-09-21 09:55
Modified
2024-08-03 00:52
Severity ?
EPSS score ?
Summary
Unrestricted Upload of File with Dangerous Type in octoprint/octoprint
References
▼ | URL | Tags |
---|---|---|
https://huntr.dev/bounties/b966c74d-6f3f-49fe-b40a-eaf25e362c56 | x_refsource_CONFIRM | |
https://github.com/octoprint/octoprint/commit/3e3c11811e216fb371a33e28412df83f9701e5b0 | x_refsource_MISC |
Impacted products
▼ | Vendor | Product |
---|---|---|
octoprint | octoprint/octoprint |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T00:52:58.717Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://huntr.dev/bounties/b966c74d-6f3f-49fe-b40a-eaf25e362c56" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://github.com/octoprint/octoprint/commit/3e3c11811e216fb371a33e28412df83f9701e5b0" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "octoprint/octoprint", "vendor": "octoprint", "versions": [ { "lessThan": "1.8.3", "status": "affected", "version": "unspecified", "versionType": "custom" } ] } ], "descriptions": [ { "lang": "en", "value": "Unrestricted Upload of File with Dangerous Type in GitHub repository octoprint/octoprint prior to 1.8.3." } ], "metrics": [ { "cvssV3_0": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 3.7, "baseSeverity": "LOW", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:L/UI:R/S:U/C:L/I:L/A:N", "version": "3.0" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-434", "description": "CWE-434 Unrestricted Upload of File with Dangerous Type", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2022-09-21T09:55:08", "orgId": "c09c270a-b464-47c1-9133-acb35b22c19a", "shortName": "@huntrdev" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "https://huntr.dev/bounties/b966c74d-6f3f-49fe-b40a-eaf25e362c56" }, { "tags": [ "x_refsource_MISC" ], "url": "https://github.com/octoprint/octoprint/commit/3e3c11811e216fb371a33e28412df83f9701e5b0" } ], "source": { "advisory": "b966c74d-6f3f-49fe-b40a-eaf25e362c56", "discovery": "EXTERNAL" }, "title": "Unrestricted Upload of File with Dangerous Type in octoprint/octoprint", "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "security@huntr.dev", "ID": "CVE-2022-2872", "STATE": "PUBLIC", "TITLE": "Unrestricted Upload of File with Dangerous Type in octoprint/octoprint" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "octoprint/octoprint", "version": { "version_data": [ { "version_affected": "\u003c", "version_value": "1.8.3" } ] } } ] }, "vendor_name": "octoprint" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Unrestricted Upload of File with Dangerous Type in GitHub repository octoprint/octoprint prior to 1.8.3." } ] }, "impact": { "cvss": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 3.7, "baseSeverity": "LOW", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:L/UI:R/S:U/C:L/I:L/A:N", "version": "3.0" } }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-434 Unrestricted Upload of File with Dangerous Type" } ] } ] }, "references": { "reference_data": [ { "name": "https://huntr.dev/bounties/b966c74d-6f3f-49fe-b40a-eaf25e362c56", "refsource": "CONFIRM", "url": "https://huntr.dev/bounties/b966c74d-6f3f-49fe-b40a-eaf25e362c56" }, { "name": "https://github.com/octoprint/octoprint/commit/3e3c11811e216fb371a33e28412df83f9701e5b0", "refsource": "MISC", "url": "https://github.com/octoprint/octoprint/commit/3e3c11811e216fb371a33e28412df83f9701e5b0" } ] }, "source": { "advisory": "b966c74d-6f3f-49fe-b40a-eaf25e362c56", "discovery": "EXTERNAL" } } } }, "cveMetadata": { "assignerOrgId": "c09c270a-b464-47c1-9133-acb35b22c19a", "assignerShortName": "@huntrdev", "cveId": "CVE-2022-2872", "datePublished": "2022-09-21T09:55:08", "dateReserved": "2022-08-17T00:00:00", "dateUpdated": "2024-08-03T00:52:58.717Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2022-2930
Vulnerability from cvelistv5
Published
2022-08-22 11:35
Modified
2024-08-03 00:53
Severity ?
EPSS score ?
Summary
Unverified Password Change in octoprint/octoprint
References
▼ | URL | Tags |
---|---|---|
https://huntr.dev/bounties/da6745e4-7bcc-4e9a-9e96-0709ec9f2477 | x_refsource_CONFIRM | |
https://github.com/octoprint/octoprint/commit/1453076ee3e47fcab2dc73664ec2d61d3ef7fc4f | x_refsource_MISC |
Impacted products
▼ | Vendor | Product |
---|---|---|
octoprint | octoprint/octoprint |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T00:53:00.455Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://huntr.dev/bounties/da6745e4-7bcc-4e9a-9e96-0709ec9f2477" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://github.com/octoprint/octoprint/commit/1453076ee3e47fcab2dc73664ec2d61d3ef7fc4f" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "octoprint/octoprint", "vendor": "octoprint", "versions": [ { "lessThan": "1.8.3", "status": "affected", "version": "unspecified", "versionType": "custom" } ] } ], "descriptions": [ { "lang": "en", "value": "Unverified Password Change in GitHub repository octoprint/octoprint prior to 1.8.3." } ], "metrics": [ { "cvssV3_0": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "LOW", "baseScore": 5.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L", "version": "3.0" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-620", "description": "CWE-620 Unverified Password Change", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2022-08-22T11:35:11", "orgId": "c09c270a-b464-47c1-9133-acb35b22c19a", "shortName": "@huntrdev" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "https://huntr.dev/bounties/da6745e4-7bcc-4e9a-9e96-0709ec9f2477" }, { "tags": [ "x_refsource_MISC" ], "url": "https://github.com/octoprint/octoprint/commit/1453076ee3e47fcab2dc73664ec2d61d3ef7fc4f" } ], "source": { "advisory": "da6745e4-7bcc-4e9a-9e96-0709ec9f2477", "discovery": "EXTERNAL" }, "title": "Unverified Password Change in octoprint/octoprint", "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "security@huntr.dev", "ID": "CVE-2022-2930", "STATE": "PUBLIC", "TITLE": "Unverified Password Change in octoprint/octoprint" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "octoprint/octoprint", "version": { "version_data": [ { "version_affected": "\u003c", "version_value": "1.8.3" } ] } } ] }, "vendor_name": "octoprint" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Unverified Password Change in GitHub repository octoprint/octoprint prior to 1.8.3." } ] }, "impact": { "cvss": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "LOW", "baseScore": 5.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L", "version": "3.0" } }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-620 Unverified Password Change" } ] } ] }, "references": { "reference_data": [ { "name": "https://huntr.dev/bounties/da6745e4-7bcc-4e9a-9e96-0709ec9f2477", "refsource": "CONFIRM", "url": "https://huntr.dev/bounties/da6745e4-7bcc-4e9a-9e96-0709ec9f2477" }, { "name": "https://github.com/octoprint/octoprint/commit/1453076ee3e47fcab2dc73664ec2d61d3ef7fc4f", "refsource": "MISC", "url": "https://github.com/octoprint/octoprint/commit/1453076ee3e47fcab2dc73664ec2d61d3ef7fc4f" } ] }, "source": { "advisory": "da6745e4-7bcc-4e9a-9e96-0709ec9f2477", "discovery": "EXTERNAL" } } } }, "cveMetadata": { "assignerOrgId": "c09c270a-b464-47c1-9133-acb35b22c19a", "assignerShortName": "@huntrdev", "cveId": "CVE-2022-2930", "datePublished": "2022-08-22T11:35:11", "dateReserved": "2022-08-22T00:00:00", "dateUpdated": "2024-08-03T00:53:00.455Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2022-1430
Vulnerability from cvelistv5
Published
2022-05-18 10:00
Modified
2024-08-03 00:03
Severity ?
EPSS score ?
Summary
Cross-site Scripting (XSS) - DOM in octoprint/octoprint
References
▼ | URL | Tags |
---|---|---|
https://huntr.dev/bounties/0cd30d71-1e32-4a0b-b4c3-faaa1907b541 | x_refsource_CONFIRM | |
https://github.com/octoprint/octoprint/commit/8087528e4a7ddd15c7d95ff662deb5ef7de90045 | x_refsource_MISC |
Impacted products
▼ | Vendor | Product |
---|---|---|
octoprint | octoprint/octoprint |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T00:03:06.267Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://huntr.dev/bounties/0cd30d71-1e32-4a0b-b4c3-faaa1907b541" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://github.com/octoprint/octoprint/commit/8087528e4a7ddd15c7d95ff662deb5ef7de90045" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "octoprint/octoprint", "vendor": "octoprint", "versions": [ { "lessThan": "1.8.0", "status": "affected", "version": "unspecified", "versionType": "custom" } ] } ], "descriptions": [ { "lang": "en", "value": "Cross-site Scripting (XSS) - DOM in GitHub repository octoprint/octoprint prior to 1.8.0." } ], "metrics": [ { "cvssV3_0": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.0" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-79", "description": "CWE-79 Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2022-05-18T10:00:14", "orgId": "c09c270a-b464-47c1-9133-acb35b22c19a", "shortName": "@huntrdev" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "https://huntr.dev/bounties/0cd30d71-1e32-4a0b-b4c3-faaa1907b541" }, { "tags": [ "x_refsource_MISC" ], "url": "https://github.com/octoprint/octoprint/commit/8087528e4a7ddd15c7d95ff662deb5ef7de90045" } ], "source": { "advisory": "0cd30d71-1e32-4a0b-b4c3-faaa1907b541", "discovery": "EXTERNAL" }, "title": "Cross-site Scripting (XSS) - DOM in octoprint/octoprint", "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "security@huntr.dev", "ID": "CVE-2022-1430", "STATE": "PUBLIC", "TITLE": "Cross-site Scripting (XSS) - DOM in octoprint/octoprint" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "octoprint/octoprint", "version": { "version_data": [ { "version_affected": "\u003c", "version_value": "1.8.0" } ] } } ] }, "vendor_name": "octoprint" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Cross-site Scripting (XSS) - DOM in GitHub repository octoprint/octoprint prior to 1.8.0." } ] }, "impact": { "cvss": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.0" } }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-79 Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)" } ] } ] }, "references": { "reference_data": [ { "name": "https://huntr.dev/bounties/0cd30d71-1e32-4a0b-b4c3-faaa1907b541", "refsource": "CONFIRM", "url": "https://huntr.dev/bounties/0cd30d71-1e32-4a0b-b4c3-faaa1907b541" }, { "name": "https://github.com/octoprint/octoprint/commit/8087528e4a7ddd15c7d95ff662deb5ef7de90045", "refsource": "MISC", "url": "https://github.com/octoprint/octoprint/commit/8087528e4a7ddd15c7d95ff662deb5ef7de90045" } ] }, "source": { "advisory": "0cd30d71-1e32-4a0b-b4c3-faaa1907b541", "discovery": "EXTERNAL" } } } }, "cveMetadata": { "assignerOrgId": "c09c270a-b464-47c1-9133-acb35b22c19a", "assignerShortName": "@huntrdev", "cveId": "CVE-2022-1430", "datePublished": "2022-05-18T10:00:14", "dateReserved": "2022-04-22T00:00:00", "dateUpdated": "2024-08-03T00:03:06.267Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }