{"containers":{"cna":{"affected":[{"product":"frourio-express","vendor":"frouriojs","versions":[{"status":"affected","version":"< 0.26.0"}]}],"descriptions":[{"lang":"en","value":"Frourio-express is a minimal full stack framework, for TypeScript. Frourio-express users who uses frourio-express version prior to v0.26.0 and integration with class-validator through `validators/` folder are subject to a input validation vulnerability. Validators do not work properly for request bodies and queries in specific situations and some input is not validated at all. Users are advised to update frourio to v0.26.0 or later and to install `class-transformer` and `reflect-metadata`."}],"metrics":[{"cvssV3_1":{"attackComplexity":"HIGH","attackVector":"NETWORK","availabilityImpact":"HIGH","baseScore":8.1,"baseSeverity":"HIGH","confidentialityImpact":"HIGH","integrityImpact":"HIGH","privilegesRequired":"NONE","scope":"UNCHANGED","userInteraction":"NONE","vectorString":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H","version":"3.1"}}],"problemTypes":[{"descriptions":[{"cweId":"CWE-20","description":"CWE-20: Improper Input Validation","lang":"en","type":"CWE"}]}],"providerMetadata":{"dateUpdated":"2022-02-07T22:15:10.000Z","orgId":"a0819718-46f1-4df5-94e2-005712e83aaa","shortName":"GitHub_M"},"references":[{"tags":["x_refsource_CONFIRM"],"url":"https://github.com/frouriojs/frourio-express/security/advisories/GHSA-mmj4-777p-fpq9"},{"tags":["x_refsource_MISC"],"url":"https://github.com/frouriojs/frourio-express/commit/73ded5c6f9f1c126c0cb2d05c0505e9e4db142d2"}],"source":{"advisory":"GHSA-mmj4-777p-fpq9","discovery":"UNKNOWN"},"title":"Validation bypass in frourio-express","x_legacyV4Record":{"CVE_data_meta":{"ASSIGNER":"security-advisories@github.com","ID":"CVE-2022-23624","STATE":"PUBLIC","TITLE":"Validation bypass in frourio-express"},"affects":{"vendor":{"vendor_data":[{"product":{"product_data":[{"product_name":"frourio-express","version":{"version_data":[{"version_value":"< 0.26.0"}]}}]},"vendor_name":"frouriojs"}]}},"data_format":"MITRE","data_type":"CVE","data_version":"4.0","description":{"description_data":[{"lang":"eng","value":"Frourio-express is a minimal full stack framework, for TypeScript. Frourio-express users who uses frourio-express version prior to v0.26.0 and integration with class-validator through `validators/` folder are subject to a input validation vulnerability. Validators do not work properly for request bodies and queries in specific situations and some input is not validated at all. Users are advised to update frourio to v0.26.0 or later and to install `class-transformer` and `reflect-metadata`."}]},"impact":{"cvss":{"attackComplexity":"HIGH","attackVector":"NETWORK","availabilityImpact":"HIGH","baseScore":8.1,"baseSeverity":"HIGH","confidentialityImpact":"HIGH","integrityImpact":"HIGH","privilegesRequired":"NONE","scope":"UNCHANGED","userInteraction":"NONE","vectorString":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H","version":"3.1"}},"problemtype":{"problemtype_data":[{"description":[{"lang":"eng","value":"CWE-20: Improper Input Validation"}]}]},"references":{"reference_data":[{"name":"https://github.com/frouriojs/frourio-express/security/advisories/GHSA-mmj4-777p-fpq9","refsource":"CONFIRM","url":"https://github.com/frouriojs/frourio-express/security/advisories/GHSA-mmj4-777p-fpq9"},{"name":"https://github.com/frouriojs/frourio-express/commit/73ded5c6f9f1c126c0cb2d05c0505e9e4db142d2","refsource":"MISC","url":"https://github.com/frouriojs/frourio-express/commit/73ded5c6f9f1c126c0cb2d05c0505e9e4db142d2"}]},"source":{"advisory":"GHSA-mmj4-777p-fpq9","discovery":"UNKNOWN"}}},"adp":[{"providerMetadata":{"orgId":"af854a3a-2127-422b-91ae-364da2661108","shortName":"CVE","dateUpdated":"2024-08-03T03:51:44.181Z"},"title":"CVE Program Container","references":[{"tags":["x_refsource_CONFIRM","x_transferred"],"url":"https://github.com/frouriojs/frourio-express/security/advisories/GHSA-mmj4-777p-fpq9"},{"tags":["x_refsource_MISC","x_transferred"],"url":"https://github.com/frouriojs/frourio-express/commit/73ded5c6f9f1c126c0cb2d05c0505e9e4db142d2"}]},{"metrics":[{"other":{"type":"ssvc","content":{"timestamp":"2025-04-23T15:56:22.815474Z","id":"CVE-2022-23624","options":[{"Exploitation":"none"},{"Automatable":"no"},{"Technical Impact":"total"}],"role":"CISA Coordinator","version":"2.0.3"}}}],"title":"CISA ADP Vulnrichment","providerMetadata":{"orgId":"134c704f-9b21-4f2e-91b3-4a467353bcc0","shortName":"CISA-ADP","dateUpdated":"2025-04-23T19:06:56.933Z"}}]},"cveMetadata":{"assignerOrgId":"a0819718-46f1-4df5-94e2-005712e83aaa","assignerShortName":"GitHub_M","cveId":"CVE-2022-23624","datePublished":"2022-02-07T22:15:10.000Z","dateReserved":"2022-01-19T00:00:00.000Z","dateUpdated":"2025-04-23T19:06:56.933Z","state":"PUBLISHED"},"dataType":"CVE_RECORD","dataVersion":"5.1"}