super-xray is a web vulnerability scanning tool. Versions prior to 0.7 assumed trusted input for the program config which is stored in a yaml file. An attacker with local access to the file could exploit this and compromise the program. This issue has been addressed in commit `4d0d5966` and will be included in future releases. Users are advised to upgrade. There are no known workarounds for this issue.
Fixes

Solution

No solution given by the vendor.


Workaround

No workaround given by the vendor.

History

Tue, 22 Apr 2025 16:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'poc', 'Technical Impact': 'total'}, 'version': '2.0.3'}


cve-icon MITRE

Status: PUBLISHED

Assigner: GitHub_M

Published:

Updated: 2025-04-22T15:59:43.385Z

Reserved: 2022-09-30T00:00:00.000Z

Link: CVE-2022-41958

cve-icon Vulnrichment

Updated: 2024-08-03T12:56:38.628Z

cve-icon NVD

Status : Modified

Published: 2022-11-25T18:15:11.177

Modified: 2024-11-21T07:24:09.333

Link: CVE-2022-41958

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.