|
Message-ID: <CA+ZBtZ6ENBd4PkJsuQdqG+67Z5c4Vtpp9P2HJxB03UbY3HYTaA@mail.gmail.com> Date: Wed, 26 Jan 2022 14:46:17 +0800 From: Zhang Yonglun <zhangyonglun@...che.org> To: oss-security@...ts.openwall.com, dev@...nyu.apache.org Subject: CVE-2022-23223: Apache ShenYu (incubating) Password leakage Severity: moderate Description: The HTTP response will disclose the user password. When users send the request like the following URL "dashboardUser?currentPage=1&pageSize=12", the response will disclose all the passwords of the users. This issue affects Apache ShenYu (incubating) 2.4.0 and 2.4.1. Mitigation: Upgrade to Apache ShenYu (incubating) 2.4.2 or apply patch https://github.com/apache/incubator-shenyu/pull/2357. -- Zhang Yonglun Apache ShenYu (Incubating) Apache ShardingSphere
Powered by blists - more mailing lists
Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.
Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.