First published: Tue Mar 22 2022(Updated: )
Able to create an account with long password leads to memory corruption / Integer Overflow in GitHub repository microweber/microweber prior to 1.2.12.
Credit: security@huntr.dev
Affected Software | Affected Version | How to fix |
---|---|---|
Microweber Microweber | <1.2.12 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID for this issue is CVE-2022-1036.
CVE-2022-1036 has a severity rating of 7.5 (High).
The affected software version for CVE-2022-1036 is microweber/microweber prior to 1.2.12.
The vulnerability CVE-2022-1036 can be exploited by creating an account with a long password, which leads to memory corruption or integer overflow in the GitHub repository microweber/microweber.
Yes, a fix is available for CVE-2022-1036. It can be found in the GitHub commit 82be4f0b4729be870ccefdae99a04833f134aa6a.