You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
mend-bolt-for-githubbot
changed the title
CVE-2022-29117 (High) detected in microsoft.owin.3.0.1.nupkg
CVE-2022-29117 (High) detected in multiple libraries
Jan 7, 2023
CVE-2022-29117 - High Severity Vulnerability
Vulnerable Libraries - microsoft.owin.2.1.0.nupkg, microsoft.owin.security.cookies.3.0.0.nupkg, microsoft.owin.3.0.1.nupkg
microsoft.owin.2.1.0.nupkg
Provides a set of helper types and abstractions for simplifying the creation of OWIN components.
Library home page: https://api.nuget.org/packages/microsoft.owin.2.1.0.nupkg
Dependency Hierarchy:
microsoft.owin.security.cookies.3.0.0.nupkg
Middleware that enables an application to use cookie based authentication, similar to ASP.NET's form...
Library home page: https://api.nuget.org/packages/microsoft.owin.security.cookies.3.0.0.nupkg
Path to dependency file: /FeatureSwitch/EpiSample/packages.config
Path to vulnerable library: /EpiSample/packages.config
Dependency Hierarchy:
microsoft.owin.3.0.1.nupkg
Provides a set of helper types and abstractions for simplifying the creation of OWIN components.
Library home page: https://api.nuget.org/packages/microsoft.owin.3.0.1.nupkg
Path to dependency file: /FeatureSwitch/EpiSample/packages.config
Path to vulnerable library: /EpiSample/packages.config
Dependency Hierarchy:
Found in base branch: master
Vulnerability Details
.NET and Visual Studio Denial of Service Vulnerability. This CVE ID is unique from CVE-2022-23267, CVE-2022-29145.
Publish Date: 2022-05-10
URL: CVE-2022-29117
CVSS 3 Score Details (7.5)
Base Score Metrics:
Suggested Fix
Type: Upgrade version
Origin: GHSA-3rq8-h3gj-r5c6
Release Date: 2022-05-10
Fix Resolution: Microsoft.AspNetCore.App.Runtime - 3.1.25,5.0.17,6.0.5;Microsoft.Owin - 4.2.2;Microsoft.Owin.Security.Cookies - 4.2.2
Step up your Open Source Security Game with Mend here
The text was updated successfully, but these errors were encountered: