CVE-2022-23556

Published: Dic 22, 2022 Last Modified: Nov 21, 2024 EU-VD ID: EUVD-2022-7632 Aliases: GHSA-ghw3-5qvm-3mqc
ExploitDB:
Other exploit source:
Google Dorks:
HIGH 7,0
Attack Vector: network
Attack Complexity: high
Privileges Required: none
User Interaction: none
Scope: unchanged
Confidentiality: high
Integrity: low
Availability: low

Description

AI Translation Available

CodeIgniter is a PHP full-stack web framework. This vulnerability may allow attackers to spoof their IP address when the server is behind a reverse proxy. This issue has been patched, please upgrade to version 4.2.11 or later, and configure `Config\App::$proxyIPs`. As a workaround, do not use `$request->getIPAddress()`.

EPSS (Exploit Prediction Scoring System)

Trend Analysis

EPSS (Exploit Prediction Scoring System)

Prevede la probabilità di sfruttamento basata su intelligence sulle minacce e sulle caratteristiche della vulnerabilità.

EPSS Score
0,0014
Percentile
0,3th
Updated

EPSS Score Trend (Last 90 Days)

345

Insufficient Verification of Data Authenticity

Draft
Common Consequences
Security Scopes Affected:
Integrity Other
Potential Impacts:
Varies By Context Unexpected State
Applicable Platforms
Technologies: ICS/OT
View CWE Details
Application

Codeigniter by Codeigniter

Version Range Affected
From 4.0.0 (inclusive)
To 4.2.11 (exclusive)
cpe:2.3:a:codeigniter:codeigniter:*:*:*:*:*:*:*:*
Common Platform Enumeration - Standardized vulnerability identification
https://github.com/codeigniter4/CodeIgniter4/commit/5ca8c99b2db09a2a08a01383662…
https://github.com/codeigniter4/CodeIgniter4/security/advisories/GHSA-ghw3-5qvm…
https://github.com/codeigniter4/CodeIgniter4/commit/5ca8c99b2db09a2a08a01383662…
https://github.com/codeigniter4/CodeIgniter4/security/advisories/GHSA-ghw3-5qvm…