cve/2024/CVE-2024-8260.md

18 lines
830 B
Markdown
Raw Normal View History

2024-08-31 19:52:39 +00:00
### [CVE-2024-8260](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-8260)
![](https://img.shields.io/static/v1?label=Product&message=OPA&color=blue)
![](https://img.shields.io/static/v1?label=Version&message=0%3C%20v0.68.0%20&color=brighgreen)
![](https://img.shields.io/static/v1?label=Vulnerability&message=CWE-294%20Authentication%20Bypass%20by%20Capture-replay&color=brighgreen)
### Description
A SMB force-authentication vulnerability exists in all versions of OPA for Windows prior to v0.68.0. The vulnerability exists because of improper input validation, allowing a user to pass an arbitrary SMB share instead of a Rego file as an argument to OPA CLI or to one of the OPA Go librarys functions.
### POC
#### Reference
No PoCs from references.
#### Github
- https://github.com/fkie-cad/nvd-json-data-feeds