This affects versions of the package http-cache-semantics before 4.1.1. The issue can be exploited via malicious request header values sent to a server, when that server reads the cache policy from the request using this library.
History

Sun, 08 Sep 2024 19:00:00 +0000

Type Values Removed Values Added
CPEs cpe:/a:redhat:acm:2.5::el8
cpe:/a:redhat:acm:2.6::el8
cpe:/a:redhat:multicluster_engine:2.0::el8
cpe:/a:redhat:multicluster_engine:2.1::el8

Mon, 19 Aug 2024 22:30:00 +0000

Type Values Removed Values Added
CPEs cpe:/a:redhat:acm:2.5::el8
cpe:/a:redhat:acm:2.6::el8
cpe:/a:redhat:multicluster_engine:2.0::el8
cpe:/a:redhat:multicluster_engine:2.1::el8

cve-icon MITRE

Status: PUBLISHED

Assigner: snyk

Published: 2023-01-31T05:00:01.220Z

Updated: 2024-08-03T04:49:44.438Z

Reserved: 2022-02-24T11:58:26.944Z

Link: CVE-2022-25881

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Modified

Published: 2023-01-31T05:15:11.810

Modified: 2023-11-07T03:44:51.800

Link: CVE-2022-25881

cve-icon Redhat

Severity : Moderate

Publid Date: 2023-01-31T00:00:00Z

Links: CVE-2022-25881 - Bugzilla