CVE-2022-4396

EUVD-2022-7560
A vulnerability was found in RDFlib pyrdfa3 and classified as problematic. This issue affects the function _get_option of the file pyRdfa/__init__.py. The manipulation leads to cross site scripting. The attack may be initiated remotely. The name of the patch is ffd1d62dd50d5f4190013b39cedcdfbd81f3ce3e. It is recommended to apply a patch to fix this issue. The identifier VDB-215249 was assigned to this vulnerability. NOTE: This vulnerability only affects products that are no longer supported by the maintainer.
Cross-site Scripting
ProviderTypeBase ScoreAtk. VectorAtk. ComplexityPriv. RequiredVector
NISTPrimary
3.5 LOW
NETWORK
LOW
LOW
CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:N
VulDBCNA
3.5 LOW
NETWORK
LOW
LOW
CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:N
Base Score
CVSS 3.x
EPSS Score
Percentile: 61%
Affected Products (NVD)
VendorProductVersion
pyrdfa3_projectpyrdfa3
-
𝑥
= Vulnerable software versions
Debian logo
Debian Releases
Debian Product
Codename
python-pyrdfa
bookworm
3.5.2+20220621~ds-1
fixed
bullseye
no-dsa
sid
3.6.4+ds-1
fixed
trixie
3.6.4+ds-1
fixed
Ubuntu logo
Ubuntu Releases
Ubuntu Product
Codename
py
bionic
dne
focal
dne
jammy
dne
kinetic
dne
trusty
ignored
xenial
ignored
python-pyrdfa
bionic
dne
focal
dne
jammy
needs-triage
kinetic
not-affected
lunar
not-affected
mantic
not-affected
noble
not-affected
trusty
ignored
xenial
ignored
rdflib
bionic
needs-triage
focal
needs-triage
jammy
needs-triage
kinetic
ignored
lunar
ignored
mantic
ignored
noble
needs-triage
trusty
ignored
xenial
needs-triage