Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-22w8-2mrr-vh7h

Опубликовано: 09 мар. 2026
Источник: github
Github: Не прошло ревью
CVSS4: 2.1
CVSS3: 4.3

Описание

A security vulnerability has been detected in OWASP DefectDojo up to 2.55.4. This vulnerability affects the function input_zip.read of the file parser.py of the component SonarQubeParser/MSDefenderParser. The manipulation leads to denial of service. The attack can be initiated remotely. The exploit has been disclosed publicly and may be used. Upgrading to version 2.56.0 is able to resolve this issue. The identifier of the patch is e8f1e5131535b8fd80a7b1b3085d676295fdcd41. Upgrading the affected component is recommended.

A security vulnerability has been detected in OWASP DefectDojo up to 2.55.4. This vulnerability affects the function input_zip.read of the file parser.py of the component SonarQubeParser/MSDefenderParser. The manipulation leads to denial of service. The attack can be initiated remotely. The exploit has been disclosed publicly and may be used. Upgrading to version 2.56.0 is able to resolve this issue. The identifier of the patch is e8f1e5131535b8fd80a7b1b3085d676295fdcd41. Upgrading the affected component is recommended.

EPSS

Процентиль: 6%
0.00022
Низкий

2.1 Low

CVSS4

4.3 Medium

CVSS3

Дефекты

CWE-1284
CWE-404

Связанные уязвимости

CVSS3: 4.3
nvd
17 дней назад

A security vulnerability has been detected in OWASP DefectDojo up to 2.55.4. This vulnerability affects the function input_zip.read of the file parser.py of the component SonarQubeParser/MSDefenderParser. The manipulation leads to denial of service. The attack can be initiated remotely. The exploit has been disclosed publicly and may be used. Upgrading to version 2.56.0 is able to resolve this issue. The identifier of the patch is e8f1e5131535b8fd80a7b1b3085d676295fdcd41. Upgrading the affected component is recommended.

EPSS

Процентиль: 6%
0.00022
Низкий

2.1 Low

CVSS4

4.3 Medium

CVSS3

Дефекты

CWE-1284
CWE-404