2024-11-15 19:03:21 +00:00
{
"id" : "CVE-2024-52528" ,
"sourceIdentifier" : "security-advisories@github.com" ,
"published" : "2024-11-15T17:15:23.400" ,
2024-11-18 19:03:31 +00:00
"lastModified" : "2024-11-18T17:11:56.587" ,
"vulnStatus" : "Awaiting Analysis" ,
2024-11-15 19:03:21 +00:00
"cveTags" : [ ] ,
"descriptions" : [
{
"lang" : "en" ,
"value" : "Budget Control Gateway acts as an entry point for incoming requests and routes them to the appropriate microservices for Budget Control. Budget Control Gateway does not properly validate auth tokens, which allows attackers to bypass intended restrictions. This vulnerability is fixed in 1.5.2."
2024-11-18 19:03:31 +00:00
} ,
{
"lang" : "es" ,
"value" : "Budget Control Gateway act\u00faa como un punto de entrada para las solicitudes entrantes y las dirige a los microservicios adecuados para Budget Control. Budget Control Gateway no valida correctamente los tokens de autenticaci\u00f3n, lo que permite a los atacantes eludir las restricciones previstas. Esta vulnerabilidad se solucion\u00f3 en la versi\u00f3n 1.5.2."
2024-11-15 19:03:21 +00:00
}
] ,
"metrics" : {
"cvssMetricV40" : [
{
"source" : "security-advisories@github.com" ,
"type" : "Secondary" ,
"cvssData" : {
"version" : "4.0" ,
"vectorString" : "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:N/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X" ,
2024-12-08 03:06:42 +00:00
"baseScore" : 9.3 ,
"baseSeverity" : "CRITICAL" ,
2024-11-15 19:03:21 +00:00
"attackVector" : "NETWORK" ,
"attackComplexity" : "LOW" ,
"attackRequirements" : "NONE" ,
"privilegesRequired" : "NONE" ,
"userInteraction" : "NONE" ,
"vulnerableSystemConfidentiality" : "HIGH" ,
"vulnerableSystemIntegrity" : "HIGH" ,
"vulnerableSystemAvailability" : "NONE" ,
"subsequentSystemConfidentiality" : "NONE" ,
"subsequentSystemIntegrity" : "NONE" ,
"subsequentSystemAvailability" : "NONE" ,
"exploitMaturity" : "NOT_DEFINED" ,
"confidentialityRequirements" : "NOT_DEFINED" ,
"integrityRequirements" : "NOT_DEFINED" ,
"availabilityRequirements" : "NOT_DEFINED" ,
"modifiedAttackVector" : "NOT_DEFINED" ,
"modifiedAttackComplexity" : "NOT_DEFINED" ,
"modifiedAttackRequirements" : "NOT_DEFINED" ,
"modifiedPrivilegesRequired" : "NOT_DEFINED" ,
"modifiedUserInteraction" : "NOT_DEFINED" ,
"modifiedVulnerableSystemConfidentiality" : "NOT_DEFINED" ,
"modifiedVulnerableSystemIntegrity" : "NOT_DEFINED" ,
"modifiedVulnerableSystemAvailability" : "NOT_DEFINED" ,
"modifiedSubsequentSystemConfidentiality" : "NOT_DEFINED" ,
"modifiedSubsequentSystemIntegrity" : "NOT_DEFINED" ,
"modifiedSubsequentSystemAvailability" : "NOT_DEFINED" ,
"safety" : "NOT_DEFINED" ,
"automatable" : "NOT_DEFINED" ,
"recovery" : "NOT_DEFINED" ,
"valueDensity" : "NOT_DEFINED" ,
"vulnerabilityResponseEffort" : "NOT_DEFINED" ,
2024-12-08 03:06:42 +00:00
"providerUrgency" : "NOT_DEFINED"
2024-11-15 19:03:21 +00:00
}
}
]
} ,
"weaknesses" : [
{
"source" : "security-advisories@github.com" ,
2024-12-08 03:06:42 +00:00
"type" : "Secondary" ,
2024-11-15 19:03:21 +00:00
"description" : [
{
"lang" : "en" ,
"value" : "CWE-285"
}
]
}
] ,
"references" : [
{
"url" : "https://github.com/BudgetControl/Gateway/security/advisories/GHSA-jqx6-gm7f-vp7m" ,
"source" : "security-advisories@github.com"
}
]
}