CVE-2022-4797:
usememos/memos vulnerable Improper Restriction of Excessive Authentication Attempts
4.3
CVSS Score
3.1
Basic Information
CVE ID
GHSA ID
EPSS Score
0.42676%
CWE
Published
12/28/2022
Updated
2/3/2023
KEV Status
No
Technology
Go
Technical Details
CVSS Vector
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N
Package Name | Ecosystem | Vulnerable Versions | First Patched Version |
---|---|---|---|
github.com/usememos/memos | go | <= 0.9.0 | 0.9.1 |
Vulnerability Intelligence
Miggo AI
Root Cause Analysis
The vulnerability stemmed from insufficient access control in deletion endpoints. The patch added explicit creator ID checks (memo.CreatorID != userID) after fetching resources, indicating previous versions only relied on flawed filtered finds. The diff shows:- Original code used MemoFind{CreatorID: &userID}
but didn't verify actual ownership- Post-patch added explicit memo.CreatorID
comparison- Similar pattern exists in resource deletion endpointThis demonstrates missing authorization checks in the deletion handlers that allowed ID brute-forcing attacks.