CVE-2022-31023 (GCVE-0-2022-31023)
Vulnerability from cvelistv5
Published
2022-06-02 18:05
Modified
2024-08-03 07:03
Severity ?
EPSS score ?
Summary
Play Framework is a web framework for Java and Scala. Verions prior to 2.8.16 are vulnerable to generation of error messages containing sensitive information. Play Framework, when run in dev mode, shows verbose errors for easy debugging, including an exception stack trace. Play does this by configuring its `DefaultHttpErrorHandler` to do so based on the application mode. In its Scala API Play also provides a static object `DefaultHttpErrorHandler` that is configured to always show verbose errors. This is used as a default value in some Play APIs, so it is possible to inadvertently use this version in production. It is also possible to improperly configure the `DefaultHttpErrorHandler` object instance as the injected error handler. Both of these situations could result in verbose errors displaying to users in a production application, which could expose sensitive information from the application. In particular, the constructor for `CORSFilter` and `apply` method for `CORSActionBuilder` use the static object `DefaultHttpErrorHandler` as a default value. This is patched in Play Framework 2.8.16. The `DefaultHttpErrorHandler` object has been changed to use the prod-mode behavior, and `DevHttpErrorHandler` has been introduced for the dev-mode behavior. A workaround is available. When constructing a `CORSFilter` or `CORSActionBuilder`, ensure that a properly-configured error handler is passed. Generally this should be done by using the `HttpErrorHandler` instance provided through dependency injection or through Play's `BuiltInComponents`. Ensure that the application is not using the `DefaultHttpErrorHandler` static object in any code that may be run in production.
References
▼ | URL | Tags | |
---|---|---|---|
security-advisories@github.com | https://github.com/playframework/playframework/pull/11305 | Issue Tracking, Patch, Third Party Advisory | |
security-advisories@github.com | https://github.com/playframework/playframework/releases/tag/2.8.16 | Release Notes, Third Party Advisory | |
security-advisories@github.com | https://github.com/playframework/playframework/security/advisories/GHSA-p9p4-97g9-wcrh | Mitigation, Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://github.com/playframework/playframework/pull/11305 | Issue Tracking, Patch, Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://github.com/playframework/playframework/releases/tag/2.8.16 | Release Notes, Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://github.com/playframework/playframework/security/advisories/GHSA-p9p4-97g9-wcrh | Mitigation, Third Party Advisory |
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
playframework | playframework |
Version: < 2.8.16 |
{ containers: { adp: [ { providerMetadata: { dateUpdated: "2024-08-03T07:03:40.340Z", orgId: "af854a3a-2127-422b-91ae-364da2661108", shortName: "CVE", }, references: [ { tags: [ "x_refsource_MISC", "x_transferred", ], url: "https://github.com/playframework/playframework/releases/tag/2.8.16", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "https://github.com/playframework/playframework/security/advisories/GHSA-p9p4-97g9-wcrh", }, { tags: [ "x_refsource_MISC", "x_transferred", ], url: "https://github.com/playframework/playframework/pull/11305", }, ], title: "CVE Program Container", }, ], cna: { affected: [ { product: "playframework", vendor: "playframework", versions: [ { status: "affected", version: "< 2.8.16", }, ], }, ], descriptions: [ { lang: "en", value: "Play Framework is a web framework for Java and Scala. Verions prior to 2.8.16 are vulnerable to generation of error messages containing sensitive information. Play Framework, when run in dev mode, shows verbose errors for easy debugging, including an exception stack trace. Play does this by configuring its `DefaultHttpErrorHandler` to do so based on the application mode. In its Scala API Play also provides a static object `DefaultHttpErrorHandler` that is configured to always show verbose errors. This is used as a default value in some Play APIs, so it is possible to inadvertently use this version in production. It is also possible to improperly configure the `DefaultHttpErrorHandler` object instance as the injected error handler. Both of these situations could result in verbose errors displaying to users in a production application, which could expose sensitive information from the application. In particular, the constructor for `CORSFilter` and `apply` method for `CORSActionBuilder` use the static object `DefaultHttpErrorHandler` as a default value. This is patched in Play Framework 2.8.16. The `DefaultHttpErrorHandler` object has been changed to use the prod-mode behavior, and `DevHttpErrorHandler` has been introduced for the dev-mode behavior. A workaround is available. When constructing a `CORSFilter` or `CORSActionBuilder`, ensure that a properly-configured error handler is passed. Generally this should be done by using the `HttpErrorHandler` instance provided through dependency injection or through Play's `BuiltInComponents`. Ensure that the application is not using the `DefaultHttpErrorHandler` static object in any code that may be run in production.", }, ], metrics: [ { cvssV3_1: { attackComplexity: "HIGH", attackVector: "NETWORK", availabilityImpact: "NONE", baseScore: 5.9, baseSeverity: "MEDIUM", confidentialityImpact: "HIGH", integrityImpact: "NONE", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N", version: "3.1", }, }, ], problemTypes: [ { descriptions: [ { cweId: "CWE-209", description: "CWE-209: Generation of Error Message Containing Sensitive Information", lang: "en", type: "CWE", }, ], }, ], providerMetadata: { dateUpdated: "2022-06-02T18:05:11", orgId: "a0819718-46f1-4df5-94e2-005712e83aaa", shortName: "GitHub_M", }, references: [ { tags: [ "x_refsource_MISC", ], url: "https://github.com/playframework/playframework/releases/tag/2.8.16", }, { tags: [ "x_refsource_CONFIRM", ], url: "https://github.com/playframework/playframework/security/advisories/GHSA-p9p4-97g9-wcrh", }, { tags: [ "x_refsource_MISC", ], url: "https://github.com/playframework/playframework/pull/11305", }, ], source: { advisory: "GHSA-p9p4-97g9-wcrh", discovery: "UNKNOWN", }, title: "Dev error stack trace leaking into prod in Play Framework", x_legacyV4Record: { CVE_data_meta: { ASSIGNER: "security-advisories@github.com", ID: "CVE-2022-31023", STATE: "PUBLIC", TITLE: "Dev error stack trace leaking into prod in Play Framework", }, affects: { vendor: { vendor_data: [ { product: { product_data: [ { product_name: "playframework", version: { version_data: [ { version_value: "< 2.8.16", }, ], }, }, ], }, vendor_name: "playframework", }, ], }, }, data_format: "MITRE", data_type: "CVE", data_version: "4.0", description: { description_data: [ { lang: "eng", value: "Play Framework is a web framework for Java and Scala. Verions prior to 2.8.16 are vulnerable to generation of error messages containing sensitive information. Play Framework, when run in dev mode, shows verbose errors for easy debugging, including an exception stack trace. Play does this by configuring its `DefaultHttpErrorHandler` to do so based on the application mode. In its Scala API Play also provides a static object `DefaultHttpErrorHandler` that is configured to always show verbose errors. This is used as a default value in some Play APIs, so it is possible to inadvertently use this version in production. It is also possible to improperly configure the `DefaultHttpErrorHandler` object instance as the injected error handler. Both of these situations could result in verbose errors displaying to users in a production application, which could expose sensitive information from the application. In particular, the constructor for `CORSFilter` and `apply` method for `CORSActionBuilder` use the static object `DefaultHttpErrorHandler` as a default value. This is patched in Play Framework 2.8.16. The `DefaultHttpErrorHandler` object has been changed to use the prod-mode behavior, and `DevHttpErrorHandler` has been introduced for the dev-mode behavior. A workaround is available. When constructing a `CORSFilter` or `CORSActionBuilder`, ensure that a properly-configured error handler is passed. Generally this should be done by using the `HttpErrorHandler` instance provided through dependency injection or through Play's `BuiltInComponents`. Ensure that the application is not using the `DefaultHttpErrorHandler` static object in any code that may be run in production.", }, ], }, impact: { cvss: { attackComplexity: "HIGH", attackVector: "NETWORK", availabilityImpact: "NONE", baseScore: 5.9, baseSeverity: "MEDIUM", confidentialityImpact: "HIGH", integrityImpact: "NONE", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N", version: "3.1", }, }, problemtype: { problemtype_data: [ { description: [ { lang: "eng", value: "CWE-209: Generation of Error Message Containing Sensitive Information", }, ], }, ], }, references: { reference_data: [ { name: "https://github.com/playframework/playframework/releases/tag/2.8.16", refsource: "MISC", url: "https://github.com/playframework/playframework/releases/tag/2.8.16", }, { name: "https://github.com/playframework/playframework/security/advisories/GHSA-p9p4-97g9-wcrh", refsource: "CONFIRM", url: "https://github.com/playframework/playframework/security/advisories/GHSA-p9p4-97g9-wcrh", }, { name: "https://github.com/playframework/playframework/pull/11305", refsource: "MISC", url: "https://github.com/playframework/playframework/pull/11305", }, ], }, source: { advisory: "GHSA-p9p4-97g9-wcrh", discovery: "UNKNOWN", }, }, }, }, cveMetadata: { assignerOrgId: "a0819718-46f1-4df5-94e2-005712e83aaa", assignerShortName: "GitHub_M", cveId: "CVE-2022-31023", datePublished: "2022-06-02T18:05:11", dateReserved: "2022-05-18T00:00:00", dateUpdated: "2024-08-03T07:03:40.340Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", "vulnerability-lookup:meta": { fkie_nvd: { configurations: "[{\"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:lightbend:play_framework:*:*:*:*:*:*:*:*\", \"versionEndExcluding\": \"2.8.16\", \"matchCriteriaId\": \"E641F3DB-3013-49F8-9E2E-082D808C9958\"}]}]}]", descriptions: "[{\"lang\": \"en\", \"value\": \"Play Framework is a web framework for Java and Scala. Verions prior to 2.8.16 are vulnerable to generation of error messages containing sensitive information. Play Framework, when run in dev mode, shows verbose errors for easy debugging, including an exception stack trace. Play does this by configuring its `DefaultHttpErrorHandler` to do so based on the application mode. In its Scala API Play also provides a static object `DefaultHttpErrorHandler` that is configured to always show verbose errors. This is used as a default value in some Play APIs, so it is possible to inadvertently use this version in production. It is also possible to improperly configure the `DefaultHttpErrorHandler` object instance as the injected error handler. Both of these situations could result in verbose errors displaying to users in a production application, which could expose sensitive information from the application. In particular, the constructor for `CORSFilter` and `apply` method for `CORSActionBuilder` use the static object `DefaultHttpErrorHandler` as a default value. This is patched in Play Framework 2.8.16. The `DefaultHttpErrorHandler` object has been changed to use the prod-mode behavior, and `DevHttpErrorHandler` has been introduced for the dev-mode behavior. A workaround is available. When constructing a `CORSFilter` or `CORSActionBuilder`, ensure that a properly-configured error handler is passed. Generally this should be done by using the `HttpErrorHandler` instance provided through dependency injection or through Play's `BuiltInComponents`. Ensure that the application is not using the `DefaultHttpErrorHandler` static object in any code that may be run in production.\"}, {\"lang\": \"es\", \"value\": \"Play Framework es un framework web para Java y Scala. Las versiones anteriores a 2.8.16 son vulnerables a una generaci\\u00f3n de mensajes de error que contienen informaci\\u00f3n confidencial. Play Framework, cuando es ejecutado en modo dev, muestra errores verbose para facilitar la depuraci\\u00f3n, incluyendo un seguimiento de la pila de excepciones. Play hace esto configurando su \\\"DefaultHttpErrorHandler\\\" para que lo haga en funci\\u00f3n del modo de aplicaci\\u00f3n. En su API Scala, Play tambi\\u00e9n proporciona un objeto est\\u00e1tico \\\"DefaultHttpErrorHandler\\\" que est\\u00e1 configurado para mostrar siempre los errores verbose. Esto es usado como valor por defecto en algunas APIs de Play, por lo que es posible usar inadvertidamente esta versi\\u00f3n en producci\\u00f3n. Tambi\\u00e9n es posible configurar incorrectamente la instancia del objeto \\\"DefaultHttpErrorHandler\\\" como administrador de errores inyectado. Ambas situaciones podr\\u00edan resultar en que sean mostrados errores verbales a usuarios en una aplicaci\\u00f3n de producci\\u00f3n, lo que podr\\u00eda exponer informaci\\u00f3n confidencial de la aplicaci\\u00f3n. En concreto, el constructor de \\\"CORSFilter\\\" y el m\\u00e9todo \\\"apply\\\" de \\\"CORSActionBuilder\\\" usan el objeto est\\u00e1tico \\\"DefaultHttpErrorHandler\\\" como valor por defecto. Esto ha sido corregido en Play Framework versi\\u00f3n 2.8.16. El objeto \\\"DefaultHttpErrorHandler\\\" ha sido cambiado para usar el comportamiento del modo prod, y ha sido introducido \\\"DevHttpErrorHandler\\\" para el comportamiento del modo dev. Se presenta una mitigaci\\u00f3n disponible. Cuando construya un \\\"CORSFilter\\\" o un \\\"CORSActionBuilder\\\", aseg\\u00farese de que es pasado un manejador de errores correctamente configurado. Generalmente, esto deber\\u00eda hacerse al usar la instancia \\\"HttpErrorHandler\\\" proporcionada mediante la inyecci\\u00f3n de dependencia o mediante \\\"BuiltInComponents\\\" de Play. Aseg\\u00farese de que la aplicaci\\u00f3n no usa el objeto est\\u00e1tico \\\"DefaultHttpErrorHandler\\\" en ning\\u00fan c\\u00f3digo que pueda ejecutarse en producci\\u00f3n\"}]", id: "CVE-2022-31023", lastModified: "2024-11-21T07:03:44.027", metrics: "{\"cvssMetricV31\": [{\"source\": \"security-advisories@github.com\", \"type\": \"Secondary\", \"cvssData\": {\"version\": \"3.1\", \"vectorString\": \"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N\", \"baseScore\": 5.9, \"baseSeverity\": \"MEDIUM\", \"attackVector\": \"NETWORK\", \"attackComplexity\": \"HIGH\", \"privilegesRequired\": \"NONE\", \"userInteraction\": \"NONE\", \"scope\": \"UNCHANGED\", \"confidentialityImpact\": \"HIGH\", \"integrityImpact\": \"NONE\", \"availabilityImpact\": \"NONE\"}, \"exploitabilityScore\": 2.2, \"impactScore\": 3.6}, {\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"cvssData\": {\"version\": \"3.1\", \"vectorString\": \"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N\", \"baseScore\": 7.5, \"baseSeverity\": \"HIGH\", \"attackVector\": \"NETWORK\", \"attackComplexity\": \"LOW\", \"privilegesRequired\": \"NONE\", \"userInteraction\": \"NONE\", \"scope\": \"UNCHANGED\", \"confidentialityImpact\": \"HIGH\", \"integrityImpact\": \"NONE\", \"availabilityImpact\": \"NONE\"}, \"exploitabilityScore\": 3.9, \"impactScore\": 3.6}], \"cvssMetricV2\": [{\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"cvssData\": {\"version\": \"2.0\", \"vectorString\": \"AV:N/AC:L/Au:N/C:P/I:N/A:N\", \"baseScore\": 5.0, \"accessVector\": \"NETWORK\", \"accessComplexity\": \"LOW\", \"authentication\": \"NONE\", \"confidentialityImpact\": \"PARTIAL\", \"integrityImpact\": \"NONE\", \"availabilityImpact\": \"NONE\"}, \"baseSeverity\": \"MEDIUM\", \"exploitabilityScore\": 10.0, \"impactScore\": 2.9, \"acInsufInfo\": false, \"obtainAllPrivilege\": false, \"obtainUserPrivilege\": false, \"obtainOtherPrivilege\": false, \"userInteractionRequired\": false}]}", published: "2022-06-02T18:15:09.820", references: "[{\"url\": \"https://github.com/playframework/playframework/pull/11305\", \"source\": \"security-advisories@github.com\", \"tags\": [\"Issue Tracking\", \"Patch\", \"Third Party Advisory\"]}, {\"url\": \"https://github.com/playframework/playframework/releases/tag/2.8.16\", \"source\": \"security-advisories@github.com\", \"tags\": [\"Release Notes\", \"Third Party Advisory\"]}, {\"url\": \"https://github.com/playframework/playframework/security/advisories/GHSA-p9p4-97g9-wcrh\", \"source\": \"security-advisories@github.com\", \"tags\": [\"Mitigation\", \"Third Party Advisory\"]}, {\"url\": \"https://github.com/playframework/playframework/pull/11305\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Issue Tracking\", \"Patch\", \"Third Party Advisory\"]}, {\"url\": \"https://github.com/playframework/playframework/releases/tag/2.8.16\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Release Notes\", \"Third Party Advisory\"]}, {\"url\": \"https://github.com/playframework/playframework/security/advisories/GHSA-p9p4-97g9-wcrh\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Mitigation\", \"Third Party Advisory\"]}]", sourceIdentifier: "security-advisories@github.com", vulnStatus: "Modified", weaknesses: "[{\"source\": \"security-advisories@github.com\", \"type\": \"Primary\", \"description\": [{\"lang\": \"en\", \"value\": \"CWE-209\"}]}]", }, nvd: "{\"cve\":{\"id\":\"CVE-2022-31023\",\"sourceIdentifier\":\"security-advisories@github.com\",\"published\":\"2022-06-02T18:15:09.820\",\"lastModified\":\"2024-11-21T07:03:44.027\",\"vulnStatus\":\"Modified\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"Play Framework is a web framework for Java and Scala. Verions prior to 2.8.16 are vulnerable to generation of error messages containing sensitive information. Play Framework, when run in dev mode, shows verbose errors for easy debugging, including an exception stack trace. Play does this by configuring its `DefaultHttpErrorHandler` to do so based on the application mode. In its Scala API Play also provides a static object `DefaultHttpErrorHandler` that is configured to always show verbose errors. This is used as a default value in some Play APIs, so it is possible to inadvertently use this version in production. It is also possible to improperly configure the `DefaultHttpErrorHandler` object instance as the injected error handler. Both of these situations could result in verbose errors displaying to users in a production application, which could expose sensitive information from the application. In particular, the constructor for `CORSFilter` and `apply` method for `CORSActionBuilder` use the static object `DefaultHttpErrorHandler` as a default value. This is patched in Play Framework 2.8.16. The `DefaultHttpErrorHandler` object has been changed to use the prod-mode behavior, and `DevHttpErrorHandler` has been introduced for the dev-mode behavior. A workaround is available. When constructing a `CORSFilter` or `CORSActionBuilder`, ensure that a properly-configured error handler is passed. Generally this should be done by using the `HttpErrorHandler` instance provided through dependency injection or through Play's `BuiltInComponents`. Ensure that the application is not using the `DefaultHttpErrorHandler` static object in any code that may be run in production.\"},{\"lang\":\"es\",\"value\":\"Play Framework es un framework web para Java y Scala. Las versiones anteriores a 2.8.16 son vulnerables a una generación de mensajes de error que contienen información confidencial. Play Framework, cuando es ejecutado en modo dev, muestra errores verbose para facilitar la depuración, incluyendo un seguimiento de la pila de excepciones. Play hace esto configurando su \\\"DefaultHttpErrorHandler\\\" para que lo haga en función del modo de aplicación. En su API Scala, Play también proporciona un objeto estático \\\"DefaultHttpErrorHandler\\\" que está configurado para mostrar siempre los errores verbose. Esto es usado como valor por defecto en algunas APIs de Play, por lo que es posible usar inadvertidamente esta versión en producción. También es posible configurar incorrectamente la instancia del objeto \\\"DefaultHttpErrorHandler\\\" como administrador de errores inyectado. Ambas situaciones podrían resultar en que sean mostrados errores verbales a usuarios en una aplicación de producción, lo que podría exponer información confidencial de la aplicación. En concreto, el constructor de \\\"CORSFilter\\\" y el método \\\"apply\\\" de \\\"CORSActionBuilder\\\" usan el objeto estático \\\"DefaultHttpErrorHandler\\\" como valor por defecto. Esto ha sido corregido en Play Framework versión 2.8.16. El objeto \\\"DefaultHttpErrorHandler\\\" ha sido cambiado para usar el comportamiento del modo prod, y ha sido introducido \\\"DevHttpErrorHandler\\\" para el comportamiento del modo dev. Se presenta una mitigación disponible. Cuando construya un \\\"CORSFilter\\\" o un \\\"CORSActionBuilder\\\", asegúrese de que es pasado un manejador de errores correctamente configurado. Generalmente, esto debería hacerse al usar la instancia \\\"HttpErrorHandler\\\" proporcionada mediante la inyección de dependencia o mediante \\\"BuiltInComponents\\\" de Play. Asegúrese de que la aplicación no usa el objeto estático \\\"DefaultHttpErrorHandler\\\" en ningún código que pueda ejecutarse en producción\"}],\"metrics\":{\"cvssMetricV31\":[{\"source\":\"security-advisories@github.com\",\"type\":\"Secondary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N\",\"baseScore\":5.9,\"baseSeverity\":\"MEDIUM\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"HIGH\",\"privilegesRequired\":\"NONE\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"HIGH\",\"integrityImpact\":\"NONE\",\"availabilityImpact\":\"NONE\"},\"exploitabilityScore\":2.2,\"impactScore\":3.6},{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N\",\"baseScore\":7.5,\"baseSeverity\":\"HIGH\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"NONE\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"HIGH\",\"integrityImpact\":\"NONE\",\"availabilityImpact\":\"NONE\"},\"exploitabilityScore\":3.9,\"impactScore\":3.6}],\"cvssMetricV2\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"2.0\",\"vectorString\":\"AV:N/AC:L/Au:N/C:P/I:N/A:N\",\"baseScore\":5.0,\"accessVector\":\"NETWORK\",\"accessComplexity\":\"LOW\",\"authentication\":\"NONE\",\"confidentialityImpact\":\"PARTIAL\",\"integrityImpact\":\"NONE\",\"availabilityImpact\":\"NONE\"},\"baseSeverity\":\"MEDIUM\",\"exploitabilityScore\":10.0,\"impactScore\":2.9,\"acInsufInfo\":false,\"obtainAllPrivilege\":false,\"obtainUserPrivilege\":false,\"obtainOtherPrivilege\":false,\"userInteractionRequired\":false}]},\"weaknesses\":[{\"source\":\"security-advisories@github.com\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-209\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:lightbend:play_framework:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"2.8.16\",\"matchCriteriaId\":\"E641F3DB-3013-49F8-9E2E-082D808C9958\"}]}]}],\"references\":[{\"url\":\"https://github.com/playframework/playframework/pull/11305\",\"source\":\"security-advisories@github.com\",\"tags\":[\"Issue Tracking\",\"Patch\",\"Third Party Advisory\"]},{\"url\":\"https://github.com/playframework/playframework/releases/tag/2.8.16\",\"source\":\"security-advisories@github.com\",\"tags\":[\"Release Notes\",\"Third Party Advisory\"]},{\"url\":\"https://github.com/playframework/playframework/security/advisories/GHSA-p9p4-97g9-wcrh\",\"source\":\"security-advisories@github.com\",\"tags\":[\"Mitigation\",\"Third Party Advisory\"]},{\"url\":\"https://github.com/playframework/playframework/pull/11305\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Issue Tracking\",\"Patch\",\"Third Party Advisory\"]},{\"url\":\"https://github.com/playframework/playframework/releases/tag/2.8.16\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Release Notes\",\"Third Party Advisory\"]},{\"url\":\"https://github.com/playframework/playframework/security/advisories/GHSA-p9p4-97g9-wcrh\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Mitigation\",\"Third Party Advisory\"]}]}}", }, }
Log in or create an account to share your comment.
Security Advisory comment format.
This schema specifies the format of a comment related to a security advisory.
Title of the comment
Description of the comment
Loading…
Loading…
Loading…
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.