CVE-2022-39292
moderate-risk
Published 2022-10-10
Slack Morphism is a modern client library for Slack Web/Events API/Socket Mode and Block Kit. Debug logs expose sensitive URLs for Slack webhooks that contain private information. The problem is fixed in version 1.3.2 which redacts sensitive URLs for webhooks. As a workaround, people who use Slack webhooks may disable or filter debug logs.
Do I need to act?
-
0.39% chance of exploitation
EPSS score — low exploit probability
-
Not on CISA KEV list
No confirmed active exploitation reported to CISA
?
Patch status unknown
Check vendor advisories for fix availability and mitigation guidance
7
CVSS 7.5/10
High
NETWORK
/ LOW complexity
Affected Products (1)
Slack Morphism
Affected Vendors
References (4)
Third Party Advisory
https://github.com/abdolence/slack-morphism-rust/security/advisories/GHSA-4mjx-2...
Third Party Advisory
https://github.com/abdolence/slack-morphism-rust/security/advisories/GHSA-4mjx-2...
32
/ 100
moderate-risk
Severity
26/34 · High
Exploitability
1/34 · Minimal
Exposure
5/34 · Minimal