Vulnerability Monitor

The vendors, products, and vulnerabilities you care about

CVE-2023-22481


FreshRSS is a self-hosted RSS feed aggregator. When using the greader API, the provided password is logged in clear in `users/_/log_api.txt` in the case where the authentication fails. The issues occurs in `authorizationToUser()` in `greader.php`. If there is an issue with the request or the credentials, `unauthorized()` or `badRequest()` is called. Both these functions are printing the return of `debugInfo()` in the logs. `debugInfo()` will return the content of the request. By default, this will be saved in `users/_/log_api.txt` and if the const `COPY_LOG_TO_SYSLOG` is true, in syslogs as well. Exploiting this issue requires having access to logs produced by FreshRSS. Using the information from the logs, a malicious individual could get users' API keys (would be displayed if the users fills in a bad username) or passwords.


Published

2023-03-06T18:15:10.357

Last Modified

2024-11-21T07:44:53.610

Status

Modified

Source

[email protected]

Severity

CVSSv3.1: 4.0 (MEDIUM)

Weaknesses
  • Type: Secondary
    CWE-532

Affected Vendors & Products
Type Vendor Product Version/Range Vulnerable?
Application freshrss freshrss < 1.21.0 Yes

References