Openwrt before v21.02.3 and Openwrt v22.03.0-rc6 were discovered to contain two skip loops in the function header_value(). This vulnerability allows attackers to access sensitive information via a crafted HTTP request.
References
Link | Resource |
---|---|
https://git.openwrt.org/?p=project/cgi-io.git;a=commitdiff;h=901b0f0463c9d16a8cf5b9ed37118d8484bc9176 | Mailing List Patch Vendor Advisory |
https://git.openwrt.org/?p=project/cgi-io.git;a=commit;h=901b0f0463c9d16a8cf5b9ed37118d8484bc9176 | Mailing List Patch Vendor Advisory |
https://git.openwrt.org/?p=project/cgi-io.git;a=patch;h=901b0f0463c9d16a8cf5b9ed37118d8484bc9176 | Mailing List Patch Vendor Advisory |
Configurations
Configuration 1 (hide)
|
Information
Published : 2022-09-19 10:15
Updated : 2022-09-21 15:51
NVD link : CVE-2022-38333
Mitre link : CVE-2022-38333
JSON object : View
CWE
Products Affected
openwrt
- openwrt