CVE-2022-3959
low-risk
Published 2022-11-11
A vulnerability, which was classified as problematic, has been found in drogon up to 1.8.1. Affected by this issue is some unknown functionality of the component Session Hash Handler. The manipulation leads to small space of random values. The attack may be launched remotely. Upgrading to version 1.8.2 is able to address this issue. The name of the patch is c0d48da99f66aaada17bcd28b07741cac8697647. It is recommended to upgrade the affected component. The identifier of this vulnerability is VDB-213464.
Do I need to act?
~
1.1% chance of exploitation in next 30 days
EPSS score — moderate exploit probability
-
Not on CISA KEV list
No confirmed active exploitation reported to CISA
?
Patch status unknown
Check vendor advisories for fix availability and mitigation guidance
3
CVSS 3.1/10
Low
NETWORK
/ HIGH complexity
Affected Products (1)
Drogon
Affected Vendors
References (8)
Third Party Advisory
https://vuldb.com/?id.213464
Third Party Advisory
https://vuldb.com/?id.213464
19
/ 100
low-risk
Severity
11/34 · Low
Exploitability
3/34 · Minimal
Exposure
5/34 · Minimal