First published: Tue Jan 25 2022(Updated: )
On Apache ShenYu versions 2.4.0 and 2.4.1, and endpoint existed that disclosed the passwords of all users. Users are recommended to upgrade to version 2.4.2 or later.
Credit: security@apache.org security@apache.org security@apache.org
Affected Software | Affected Version | How to fix |
---|---|---|
maven/org.apache.shenyu:shenyu-common | >=2.4.0<2.4.2 | 2.4.2 |
Apache ShenYu | =2.4.0 | |
Apache ShenYu | =2.4.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID is CVE-2022-23223.
The severity of CVE-2022-23223 is high with a CVSS score of 7.5.
The affected software is Apache ShenYu versions 2.4.0 and 2.4.1.
Users are recommended to upgrade to version 2.4.2 or later of Apache ShenYu.
You can find more information about CVE-2022-23223 at the following references: - [NVD](https://nvd.nist.gov/vuln/detail/CVE-2022-23223) - [Apache Mailing List](https://lists.apache.org/thread/q2gg6ny6lpkph7nkrvjzqdvqpm805v8s) - [Openwall](http://www.openwall.com/lists/oss-security/2022/01/25/7)