Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-mvpq-r829-8jx3

Опубликовано: 29 авг. 2024
Источник: github
Github: Не прошло ревью
CVSS4: 6.9
CVSS3: 5.3

Описание

A vulnerability was found in kitsada8621 Digital Library Management System 1.0. It has been classified as problematic. Affected is the function JwtRefreshAuth of the file middleware/jwt_refresh_token_middleware.go. The manipulation of the argument Authorization leads to improper output neutralization for logs. It is possible to launch the attack remotely. The name of the patch is 81b3336b4c9240f0bf50c13cb8375cf860d945f1. It is recommended to apply a patch to fix this issue.

A vulnerability was found in kitsada8621 Digital Library Management System 1.0. It has been classified as problematic. Affected is the function JwtRefreshAuth of the file middleware/jwt_refresh_token_middleware.go. The manipulation of the argument Authorization leads to improper output neutralization for logs. It is possible to launch the attack remotely. The name of the patch is 81b3336b4c9240f0bf50c13cb8375cf860d945f1. It is recommended to apply a patch to fix this issue.

EPSS

Процентиль: 39%
0.00177
Низкий

6.9 Medium

CVSS4

5.3 Medium

CVSS3

Дефекты

CWE-116
CWE-117

Связанные уязвимости

CVSS3: 5.3
nvd
больше 1 года назад

A vulnerability was found in kitsada8621 Digital Library Management System 1.0. It has been classified as problematic. Affected is the function JwtRefreshAuth of the file middleware/jwt_refresh_token_middleware.go. The manipulation of the argument Authorization leads to improper output neutralization for logs. It is possible to launch the attack remotely. The name of the patch is 81b3336b4c9240f0bf50c13cb8375cf860d945f1. It is recommended to apply a patch to fix this issue.

EPSS

Процентиль: 39%
0.00177
Низкий

6.9 Medium

CVSS4

5.3 Medium

CVSS3

Дефекты

CWE-116
CWE-117