← Back to CVEs
CVE-2022-41875
CRITICAL10.0
Description
A remote code execution (RCE) vulnerability in Optica allows unauthenticated attackers to execute arbitrary code via specially crafted JSON payloads. Specially crafted JSON payloads may lead to RCE (remote code execution) on the attacked system running Optica. The vulnerability was patched in v. 0.10.2, where the call to the function `oj.load` was changed to `oj.safe_load`.
CVE Details
CVSS v3.1 Score10.0
SeverityCRITICAL
CVSS VectorCVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H
Attack VectorNETWORK
ComplexityLOW
Privileges RequiredNONE
User InteractionNONE
Published11/23/2022
Last Modified11/21/2024
Sourcenvd
Honeypot Sightings0
Affected Products
airbnb:optica
Weaknesses (CWE)
CWE-502
References
https://github.com/airbnb/optica/security/advisories/GHSA-cf87-4h6x-phh6(security-advisories@github.com)
https://github.com/ohler55/oj/blob/develop/pages/Security.md(security-advisories@github.com)
https://www.rubydoc.info/gems/oj/3.0.2/Oj.safe_load(security-advisories@github.com)
https://github.com/airbnb/optica/security/advisories/GHSA-cf87-4h6x-phh6(af854a3a-2127-422b-91ae-364da2661108)
https://github.com/ohler55/oj/blob/develop/pages/Security.md(af854a3a-2127-422b-91ae-364da2661108)
https://www.rubydoc.info/gems/oj/3.0.2/Oj.safe_load(af854a3a-2127-422b-91ae-364da2661108)
IOC Correlations
No correlations recorded
This product uses data from the NVD API but is not endorsed or certified by the NVD.