Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2022-0366 | WsgiDAV is a generic and extendable WebDAV server based on WSGI. Implementations using this library with directory browsing enabled may be susceptible to Cross Site Scripting (XSS) attacks. This issue has been patched, users can upgrade to version 4.1.0. As a workaround, set `dir_browser.enable = False` in the configuration. |
Github GHSA |
GHSA-xx6g-jj35-pxjv | Cross Site Scripting vulnerability in wsgidav when directory browsing is enabled |
Wed, 23 Apr 2025 17:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Status: PUBLISHED
Assigner: GitHub_M
Published:
Updated: 2025-04-23T16:37:51.851Z
Reserved: 2022-09-30T00:00:00.000Z
Link: CVE-2022-41905
Updated: 2024-08-03T12:56:38.427Z
Status : Modified
Published: 2022-11-11T21:15:09.743
Modified: 2024-11-21T07:24:02.283
Link: CVE-2022-41905
No data.
OpenCVE Enrichment
No data.
EUVD
Github GHSA