First published: Wed Dec 28 2022(Updated: )
Authorization Bypass Through User-Controlled Key in GitHub repository usememos/memos prior to 0.9.1.
Credit: security@huntr.dev security@huntr.dev
Affected Software | Affected Version | How to fix |
---|---|---|
Usememos Memos | <0.9.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2022-4798 is a vulnerability that allows an attacker to bypass authorization by using a user-controlled key in the GitHub repository usememos/memos prior to version 0.9.1.
CVE-2022-4798 has a severity rating of 5.3, which is considered high.
An attacker can exploit CVE-2022-4798 by using a user-controlled key to bypass authorization in the usememos/memos GitHub repository prior to version 0.9.1.
To fix CVE-2022-4798, you should update the usememos/memos GitHub repository to version 0.9.1 or later.
Yes, you can find more information about CVE-2022-4798 in the following references: [GitHub Commit](https://github.com/usememos/memos/commit/3556ae4e651d9443dc3bb8a170dd3cc726517a53), [Huntr Dev](https://huntr.dev/bounties/e12eed25-1a8e-4ee1-b846-2d4df1db2fae).