First published: Fri Nov 25 2022(Updated: )
super-xray is a web vulnerability scanning tool. Versions prior to 0.7 assumed trusted input for the program config which is stored in a yaml file. An attacker with local access to the file could exploit this and compromise the program. This issue has been addressed in commit `4d0d5966` and will be included in future releases. Users are advised to upgrade. There are no known workarounds for this issue.
Credit: security-advisories@github.com
Affected Software | Affected Version | How to fix |
---|---|---|
Super Xray Project Super Xray | <0.7 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2022-41958 is a vulnerability in the Super Xray web vulnerability scanning tool that allows an attacker with local access to compromise the program.
CVE-2022-41958 has a severity rating of 7.8 (high).
CVE-2022-41958 affects Super Xray versions prior to 0.7.
An attacker with local access to the Super Xray program config file stored in a yaml file could exploit CVE-2022-41958.
To fix CVE-2022-41958, update Super Xray to version 0.7 or later.