CVE-2022-23556
HIGH
7,0
Source: [email protected]
Attack Vector: network
Attack Complexity: high
Privileges Required: none
User Interaction: none
Scope: unchanged
Confidentiality: high
Integrity: low
Availability: low
Description
AI Translation Available
CodeIgniter is a PHP full-stack web framework. This vulnerability may allow attackers to spoof their IP address when the server is behind a reverse proxy. This issue has been patched, please upgrade to version 4.2.11 or later, and configure `Config\App::$proxyIPs`. As a workaround, do not use `$request->getIPAddress()`.
EPSS (Exploit Prediction Scoring System)
Trend Analysis
EPSS (Exploit Prediction Scoring System)
Prevede la probabilità di sfruttamento basata su intelligence sulle minacce e sulle caratteristiche della vulnerabilità.
EPSS Score
0,0014
Percentile
0,3th
Updated
EPSS Score Trend (Last 90 Days)
345
Insufficient Verification of Data Authenticity
DraftCommon Consequences
Security Scopes Affected:
Integrity
Other
Potential Impacts:
Varies By Context
Unexpected State
Applicable Platforms
Technologies:
ICS/OT
Application
Codeigniter by Codeigniter
Version Range Affected
From
4.0.0
(inclusive)
To
4.2.11
(exclusive)
CPE Identifier
View Detailed Analysis
cpe:2.3:a:codeigniter:codeigniter:*:*:*:*:*:*:*:*
Common Platform Enumeration - Standardized vulnerability identification
https://github.com/codeigniter4/CodeIgniter4/commit/5ca8c99b2db09a2a08a01383662…
https://github.com/codeigniter4/CodeIgniter4/security/advisories/GHSA-ghw3-5qvm…
https://github.com/codeigniter4/CodeIgniter4/commit/5ca8c99b2db09a2a08a01383662…
https://github.com/codeigniter4/CodeIgniter4/security/advisories/GHSA-ghw3-5qvm…