{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-05-03T01:26:32.394","vulnerabilities":[{"cve":{"id":"CVE-2022-1561","sourceIdentifier":"cve-coordination@incibe.es","published":"2022-08-01T13:15:09.810","lastModified":"2024-11-21T06:40:58.340","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"Lura and KrakenD-CE versions older than v2.0.2 and KrakenD-EE versions older than v2.0.0 do not sanitize URL parameters correctly, allowing a malicious user to alter the backend URL defined for a pipe when remote users send crafty URL requests. The vulnerability does not affect KrakenD itself, but the consumed backend might be vulnerable."},{"lang":"es","value":"Lura y KrakenD-CE versiones anteriores a v2.0.2 y KrakenD-EE versiones anteriores a v2.0.0, no sanean los parámetros de la URL, lo que permite a un usuario malicioso alterar la URL del backend definida para una tubería cuando los usuarios remotos envían peticiones de URL astutas. La vulnerabilidad no afecta al propio KrakenD, pero el backend consumido podría ser vulnerable"}],"metrics":{"cvssMetricV31":[{"source":"cve-coordination@incibe.es","type":"Secondary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:L/I:N/A:N","baseScore":4.0,"baseSeverity":"MEDIUM","attackVector":"NETWORK","attackComplexity":"HIGH","privilegesRequired":"NONE","userInteraction":"NONE","scope":"CHANGED","confidentialityImpact":"LOW","integrityImpact":"NONE","availabilityImpact":"NONE"},"exploitabilityScore":2.2,"impactScore":1.4},{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N","baseScore":4.3,"baseSeverity":"MEDIUM","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"LOW","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"NONE","integrityImpact":"LOW","availabilityImpact":"NONE"},"exploitabilityScore":2.8,"impactScore":1.4}]},"weaknesses":[{"source":"cve-coordination@incibe.es","type":"Secondary","description":[{"lang":"en","value":"CWE-471"}]},{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:krakend:krakend:*:*:*:*:enterprise:*:*:*","versionEndExcluding":"2.0.0","matchCriteriaId":"3A6E0144-4F80-47D1-800E-809580D1C525"},{"vulnerable":true,"criteria":"cpe:2.3:a:krakend:krakend:*:*:*:*:community:*:*:*","versionEndIncluding":"2.0.2","matchCriteriaId":"55A063F9-8673-4B66-900F-A3B19E06777A"},{"vulnerable":true,"criteria":"cpe:2.3:a:luraproject:lura:*:*:*:*:*:*:*:*","versionEndExcluding":"2.0.2","matchCriteriaId":"E961C753-02DB-473E-9D24-6B9B400B8AE9"}]}]}],"references":[{"url":"https://www.incibe-cert.es/en/early-warning/security-advisories/crafted-backend-urls-lura-project","source":"cve-coordination@incibe.es","tags":["Third Party Advisory"]},{"url":"https://www.krakend.io/blog/cve-2022-1561-crafted-backend-urls/","source":"cve-coordination@incibe.es","tags":["Vendor Advisory"]},{"url":"https://www.incibe-cert.es/en/early-warning/security-advisories/crafted-backend-urls-lura-project","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Third Party Advisory"]},{"url":"https://www.krakend.io/blog/cve-2022-1561-crafted-backend-urls/","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Vendor Advisory"]}]}}]}