Lucene search

K
cvelistGitHub_MCVELIST:CVE-2022-41875
HistoryNov 23, 2022 - 12:00 a.m.

CVE-2022-41875 Remote Code Execution in Optica

2022-11-2300:00:00
CWE-502
GitHub_M
www.cve.org
cve-2022-41875
rce
optica
json payloads

10 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

CHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H

10 High

AI Score

Confidence

High

0.014 Low

EPSS

Percentile

86.4%

A remote code execution (RCE) vulnerability in Optica allows unauthenticated attackers to execute arbitrary code via specially crafted JSON payloads. Specially crafted JSON payloads may lead to RCE (remote code execution) on the attacked system running Optica. The vulnerability was patched in v. 0.10.2, where the call to the function oj.load was changed to oj.safe_load.

CNA Affected

[
  {
    "vendor": "airbnb",
    "product": "optica",
    "versions": [
      {
        "version": "< 0.10.2",
        "status": "affected"
      }
    ]
  }
]

10 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

CHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H

10 High

AI Score

Confidence

High

0.014 Low

EPSS

Percentile

86.4%

Related for CVELIST:CVE-2022-41875