mirror of
https://github.com/CVEProject/cvelist.git
synced 2025-07-29 05:56:59 +00:00
91 lines
3.2 KiB
JSON
91 lines
3.2 KiB
JSON
{
|
|
"CVE_data_meta": {
|
|
"ASSIGNER": "security-advisories@github.com",
|
|
"ID": "CVE-2022-39383",
|
|
"STATE": "PUBLIC",
|
|
"TITLE": "SSRF vulnerability in KubeVela VelaUX APIServer"
|
|
},
|
|
"affects": {
|
|
"vendor": {
|
|
"vendor_data": [
|
|
{
|
|
"product": {
|
|
"product_data": [
|
|
{
|
|
"product_name": "kubevela",
|
|
"version": {
|
|
"version_data": [
|
|
{
|
|
"version_value": ">= 1.6.0, < 1.6.1"
|
|
},
|
|
{
|
|
"version_value": "< 1.5.9"
|
|
}
|
|
]
|
|
}
|
|
}
|
|
]
|
|
},
|
|
"vendor_name": "kubevela"
|
|
}
|
|
]
|
|
}
|
|
},
|
|
"data_format": "MITRE",
|
|
"data_type": "CVE",
|
|
"data_version": "4.0",
|
|
"description": {
|
|
"description_data": [
|
|
{
|
|
"lang": "eng",
|
|
"value": "KubeVela is an open source application delivery platform. Users using the VelaUX APIServer could be affected by this vulnerability. When using Helm Chart as the component delivery method, the request address of the warehouse is not restricted, and there is a blind SSRF vulnerability. Users who're using v1.6, please update the v1.6.1. Users who're using v1.5, please update the v1.5.8. There are no known workarounds for this issue."
|
|
}
|
|
]
|
|
},
|
|
"impact": {
|
|
"cvss": {
|
|
"attackComplexity": "HIGH",
|
|
"attackVector": "NETWORK",
|
|
"availabilityImpact": "NONE",
|
|
"baseScore": 4.9,
|
|
"baseSeverity": "MEDIUM",
|
|
"confidentialityImpact": "LOW",
|
|
"integrityImpact": "LOW",
|
|
"privilegesRequired": "LOW",
|
|
"scope": "CHANGED",
|
|
"userInteraction": "NONE",
|
|
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:C/C:L/I:L/A:N",
|
|
"version": "3.1"
|
|
}
|
|
},
|
|
"problemtype": {
|
|
"problemtype_data": [
|
|
{
|
|
"description": [
|
|
{
|
|
"lang": "eng",
|
|
"value": "CWE-918: Server-Side Request Forgery (SSRF)"
|
|
}
|
|
]
|
|
}
|
|
]
|
|
},
|
|
"references": {
|
|
"reference_data": [
|
|
{
|
|
"name": "https://github.com/kubevela/kubevela/security/advisories/GHSA-m5xf-x7q6-3rm7",
|
|
"refsource": "CONFIRM",
|
|
"url": "https://github.com/kubevela/kubevela/security/advisories/GHSA-m5xf-x7q6-3rm7"
|
|
},
|
|
{
|
|
"name": "https://github.com/kubevela/kubevela/pull/5000",
|
|
"refsource": "MISC",
|
|
"url": "https://github.com/kubevela/kubevela/pull/5000"
|
|
}
|
|
]
|
|
},
|
|
"source": {
|
|
"advisory": "GHSA-m5xf-x7q6-3rm7",
|
|
"discovery": "UNKNOWN"
|
|
}
|
|
} |