First published: Mon Sep 19 2022(Updated: )
Openwrt before v21.02.3 and Openwrt v22.03.0-rc6 were discovered to contain two skip loops in the function header_value(). This vulnerability allows attackers to access sensitive information via a crafted HTTP request.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
OpenWrt OpenWrt | <21.02.3 | |
OpenWrt OpenWrt | =22.03.0-rc6 |
https://git.openwrt.org/?p=project/cgi-io.git;a=commit;h=901b0f0463c9d16a8cf5b9ed37118d8484bc9176
https://git.openwrt.org/?p=project/cgi-io.git;a=patch;h=901b0f0463c9d16a8cf5b9ed37118d8484bc9176
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of CVE-2022-38333 is high with a CVSS score of 7.5.
CVE-2022-38333 is a vulnerability in Openwrt before v21.02.3 and Openwrt v22.03.0-rc6 that allows attackers to access sensitive information via a crafted HTTP request.
CVE-2022-38333 affects Openwrt versions before v21.02.3 and v22.03.0-rc6.
Yes, there is a patch available for CVE-2022-38333. Please refer to the provided references for more information.
An attacker can exploit CVE-2022-38333 to gain unauthorized access to sensitive information by sending a crafted HTTP request.