59 lines
1.8 KiB
JSON
Raw Normal View History

{
"id": "CVE-2024-45719",
"sourceIdentifier": "security@apache.org",
"published": "2024-11-22T15:15:10.473",
"lastModified": "2024-11-22T21:15:18.130",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "Inadequate Encryption Strength vulnerability in Apache Answer.\n\nThis issue affects Apache Answer: through 1.4.0.\n\nThe ids generated using the UUID v1 version are to some extent not secure enough. It can cause the generated token to be predictable.\nUsers are recommended to upgrade to version 1.4.1, which fixes the issue."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:H/UI:R/S:C/C:L/I:N/A:N",
"baseScore": 2.6,
"baseSeverity": "LOW",
"attackVector": "NETWORK",
"attackComplexity": "HIGH",
"privilegesRequired": "HIGH",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "NONE",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 1.0,
"impactScore": 1.4
}
]
},
"weaknesses": [
{
"source": "security@apache.org",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-326"
}
]
}
],
"references": [
{
"url": "https://lists.apache.org/thread/sz2d0z39k01nbx3r9pj65t76o1hy9491",
"source": "security@apache.org"
},
{
"url": "http://www.openwall.com/lists/oss-security/2024/11/22/1",
"source": "af854a3a-2127-422b-91ae-364da2661108"
}
]
}