Executive Summary

Name CVE-2022-31162 First vendor Publication 2022-07-22
Vendor Cve Last vendor Modification 2023-07-24

Security-Database Scoring CVSS v3

Cvss vector : CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
Overall CVSS Score 7.5
Base Score 7.5 Environmental Score 7.5
impact SubScore 3.6 Temporal Score 7.5
Exploitabality Sub Score 3.9
Attack Vector Network Attack Complexity Low
Privileges Required None User Interaction None
Scope Unchanged Confidentiality Impact High
Integrity Impact None Availability Impact None
Calculate full CVSS 3.0 Vectors scores

Security-Database Scoring CVSS v2

Cvss vector :
Cvss Base Score N/A Attack Range N/A
Cvss Impact Score N/A Attack Complexity N/A
Cvss Expoit Score N/A Authentication N/A
Calculate full CVSS 2.0 Vectors scores


Slack Morphism is an async client library for Rust. Prior to 0.41.0, it was possible for Slack OAuth client information to leak in application debug logs. Stricter and more secure debug formatting was introduced in v0.41.0 for OAuth secret types to reduce the possibility of printing sensitive information in application logs. As a workaround, do not print/output requests and responses for OAuth and client configurations in logs.

Original Source

Url : http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-31162

CWE : Common Weakness Enumeration

% Id Name
100 % CWE-212 Improper Cross-boundary Removal of Sensitive Data

CPE : Common Platform Enumeration

Application 1

Sources (Detail)

Source Url
CONFIRM https://github.com/abdolence/slack-morphism-rust/security/advisories/GHSA-99j...
MISC https://github.com/abdolence/slack-morphism-rust/releases/tag/v0.41.0

Alert History

If you want to see full details history, please login or register.
Date Informations
2023-07-24 17:27:35
  • Multiple Updates
2022-07-29 21:27:21
  • Multiple Updates
2022-07-23 02:09:30
  • Multiple Updates
2022-07-23 02:09:08
  • Multiple Updates
2022-07-22 17:27:08
  • Multiple Updates
2022-07-22 09:27:12
  • First insertion