Lucene search

K
cvelistGitHub_MCVELIST:CVE-2022-41905
HistoryNov 11, 2022 - 12:00 a.m.

CVE-2022-41905 wsgidav is vulnerable to Cross-Site Scripting (XSS) when directory browsing is enabled

2022-11-1100:00:00
CWE-79
GitHub_M
www.cve.org
3
wsgidav
cross-site scripting
xss
directory browsing
vulnerability
webdav
server
wsgi
patch
upgrade
configuration.

CVSS3

8.2

Attack Vector

LOCAL

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

REQUIRED

Scope

CHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

NONE

CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:N

AI Score

7.9

Confidence

High

EPSS

0.001

Percentile

26.2%

WsgiDAV is a generic and extendable WebDAV server based on WSGI. Implementations using this library with directory browsing enabled may be susceptible to Cross Site Scripting (XSS) attacks. This issue has been patched, users can upgrade to version 4.1.0. As a workaround, set dir_browser.enable = False in the configuration.

CNA Affected

[
  {
    "vendor": "mar10",
    "product": "wsgidav",
    "versions": [
      {
        "version": ">= 3.0.0a1, < 4.1.0",
        "status": "affected"
      }
    ]
  }
]

CVSS3

8.2

Attack Vector

LOCAL

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

REQUIRED

Scope

CHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

NONE

CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:N

AI Score

7.9

Confidence

High

EPSS

0.001

Percentile

26.2%

Related for CVELIST:CVE-2022-41905