Lucene search

K
cve[email protected]CVE-2022-41875
HistoryNov 23, 2022 - 7:15 p.m.

CVE-2022-41875

2022-11-2319:15:12
CWE-502
web.nvd.nist.gov
26
4
cve-2022-41875
optica
rce
json
patch
nvd

10 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

CHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H

9.9 High

AI Score

Confidence

High

0.014 Low

EPSS

Percentile

86.4%

A remote code execution (RCE) vulnerability in Optica allows unauthenticated attackers to execute arbitrary code via specially crafted JSON payloads. Specially crafted JSON payloads may lead to RCE (remote code execution) on the attacked system running Optica. The vulnerability was patched in v. 0.10.2, where the call to the function oj.load was changed to oj.safe_load.

Affected configurations

Vulners
NVD
Node
airbnbopticaRange<0.10.2
VendorProductVersionCPE
airbnboptica*cpe:2.3:a:airbnb:optica:*:*:*:*:*:*:*:*

CNA Affected

[
  {
    "vendor": "airbnb",
    "product": "optica",
    "versions": [
      {
        "version": "< 0.10.2",
        "status": "affected"
      }
    ]
  }
]

Social References

More

10 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

CHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H

9.9 High

AI Score

Confidence

High

0.014 Low

EPSS

Percentile

86.4%

Related for CVE-2022-41875