Integer Overflow or Wraparound Affecting microweber/microweber package, versions <1.2.12
Threat Intelligence
EPSS
0.1% (43rd
percentile)
Do your applications use this vulnerable package?
In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.
Test your applications- Snyk ID SNYK-PHP-MICROWEBERMICROWEBER-2421197
- published 11 Mar 2022
- disclosed 11 Mar 2022
- credit SAMPRIT DAS
Introduced: 11 Mar 2022
CVE-2022-0913 Open this link in a new tabHow to fix?
Upgrade microweber/microweber
to version 1.2.12 or higher.
Overview
microweber/microweber is a new generation CMS with drag and drop.
Affected versions of this package are vulnerable to Integer Overflow or Wraparound which allows large characters to be inserted in input fields like Town, ZIP, State, Address, and Additional Info field
. It can allow attackers to cause a Denial of Service via a crafted HTTP request.
References
CVSS Scores
version 3.1