First published: Thu Jan 26 2023(Updated: )
## Withdrawn Advisory This advisory has been withdrawn because all of the files affected by this vulnerability lie in the [BTCPayServer folder](https://github.com/btcpayserver/btcpayserver/tree/master/BTCPayServer), which is not in the NuGet ecosystem. The [BTCPayServer folder](https://github.com/btcpayserver/btcpayserver/tree/master/BTCPayServer.Client), corresponding to the [BTCPayServer NuGet entry](https://www.nuget.org/packages/BTCPayServer.Client), does not contain any files that were changed to fix the vulnerability. ## Original Description Improper Neutralization of Equivalent Special Elements in GitHub repository btcpayserver/btcpayserver prior to 1.7.5.
Credit: security@huntr.dev security@huntr.dev security@huntr.dev
Affected Software | Affected Version | How to fix |
---|---|---|
nuget/BTCPayServer.Client | <1.7.5 | 1.7.5 |
BTCPayServer | <1.7.5 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2023-0493 has been withdrawn and is not currently considered a valid vulnerability since it affects files in a non-NuGet ecosystem.
There is no fix needed for CVE-2023-0493 as this vulnerability has been withdrawn.
CVE-2023-0493 affected versions before 1.7.5 of the BTCPayServer.Client package.
Information regarding CVE-2023-0493 can be found in the advisory which has been withdrawn.
Since CVE-2023-0493 has been withdrawn, no workaround is necessary.