First published: Sun Feb 13 2022(Updated: )
Cross-site Scripting (XSS) - Reflected in GitHub repository phoronix-test-suite/phoronix-test-suite prior to 10.8.2.
Credit: security@huntr.dev
Affected Software | Affected Version | How to fix |
---|---|---|
Phoronix-media Phoronix Test Suite | <10.8.2 | |
Fedoraproject Extra Packages For Enterprise Linux | =7.0 | |
Fedoraproject Extra Packages For Enterprise Linux | =8.0 | |
Fedoraproject Extra Packages For Enterprise Linux | =9.0 | |
Fedoraproject Fedora | =34 | |
Fedoraproject Fedora | =35 | |
Fedoraproject Fedora | =36 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of CVE-2022-0571 is medium with a CVSS score of 6.1.
Phoronix Test Suite versions prior to 10.8.2, Fedora Extra Packages For Enterprise Linux versions 7.0, 8.0, and 9.0, and Fedora versions 34, 35, and 36 are affected by CVE-2022-0571.
Cross-site Scripting (XSS) is a type of vulnerability where malicious scripts are injected into web pages viewed by other users, leading to the execution of those scripts on their browsers.
To fix CVE-2022-0571, update to Phoronix Test Suite version 10.8.2 or later, or update to the latest versions of Fedora Extra Packages For Enterprise Linux or Fedora, depending on the affected software.
You can find more information about CVE-2022-0571 on the following references: [GitHub Commit](https://github.com/phoronix-test-suite/phoronix-test-suite/commit/1eac9260c8313f0cfc77837ec676f4e6d68bd833), [Huntr.dev](https://huntr.dev/bounties/a5039485-6e48-4313-98ad-915506c19ae8), [Fedora Mailing List](https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KSQH5OWXAMWSM7H6VSBRDGTOE7UIOZHZ/)