Vulnerability Details CVE-2022-23497
FreshRSS is a free, self-hostable RSS aggregator. User configuration files can be accessed by a remote user. In addition to user preferences, such configurations contain hashed passwords (brypt with cost 9, salted) of FreshRSS Web interface. If the API is used, the configuration might contain a hashed password (brypt with cost 9, salted) of the GReader API, and a hashed password (MD5 salted) of the Fever API. Users should update to version 1.20.2 or edge. Users unable to upgrade can apply the patch manually or delete the file `./FreshRSS/p/ext.php`.
Exploit prediction scoring system (EPSS) score
EPSS Score 0.001
EPSS Ranking 19.9%
CVSS Severity
CVSS v3 Score 6.5
Products affected by CVE-2022-23497
-
cpe:2.3:a:freshrss:freshrss:1.18.0
-
cpe:2.3:a:freshrss:freshrss:1.18.1
-
cpe:2.3:a:freshrss:freshrss:1.19.0
-
cpe:2.3:a:freshrss:freshrss:1.19.1
-
cpe:2.3:a:freshrss:freshrss:1.19.2
-
cpe:2.3:a:freshrss:freshrss:1.20.0
-
cpe:2.3:a:freshrss:freshrss:1.20.1