2024-12-15 03:03:56 +00:00

60 lines
3.8 KiB
JSON

{
"id": "CVE-2024-55886",
"sourceIdentifier": "security-advisories@github.com",
"published": "2024-12-12T20:15:21.890",
"lastModified": "2024-12-12T20:15:21.890",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "OpenSearch Data Prepper is a component of the OpenSearch project that accepts, filters, transforms, enriches, and routes data at scale. A vulnerability exists in the OpenTelemetry Logs source in Data Prepper starting inversion 2.1.0 and prior to version 2.10.2 where some custom authentication plugins will not perform authentication. This allows unauthorized users to ingest OpenTelemetry Logs data under certain conditions. This vulnerability does not affect the built-in `http_basic` authentication provider in Data Prepper. Pipelines which use the `http_basic` authentication provider continue to require authentication. The vulnerability exists only for custom implementations of Data Prepper\u2019s `GrpcAuthenticationProvider` authentication plugin which implement the `getHttpAuthenticationService()` method instead of `getAuthenticationInterceptor()`. Data Prepper 2.10.2 contains a fix for this issue. For those unable to upgrade, one may use the built-in `http_basic` authentication provider in Data Prepper and/or add an authentication proxy in front of one's Data Prepper instances running the OpenTelemetry Logs source."
},
{
"lang": "es",
"value": "OpenSearch Data Prepper es un componente del proyecto OpenSearch que acepta, filtra, transforma, enriquece y enruta datos a escala. Existe una vulnerabilidad en la fuente de registros de OpenTelemetry en Data Prepper a partir de la versi\u00f3n 2.1.0 y anteriores a la versi\u00f3n 2.10.2, donde algunos complementos de autenticaci\u00f3n personalizados no realizan la autenticaci\u00f3n. Esto permite que usuarios no autorizados ingieran datos de registros de OpenTelemetry en determinadas condiciones. Esta vulnerabilidad no afecta al proveedor de autenticaci\u00f3n `http_basic` integrado en Data Prepper. Las canalizaciones que utilizan el proveedor de autenticaci\u00f3n `http_basic` siguen requiriendo autenticaci\u00f3n. La vulnerabilidad existe solo para las implementaciones personalizadas del complemento de autenticaci\u00f3n `GrpcAuthenticationProvider` de Data Prepper que implementan el m\u00e9todo `getHttpAuthenticationService()` en lugar de `getAuthenticationInterceptor()`. Data Prepper 2.10.2 contiene una soluci\u00f3n para este problema. Quienes no puedan actualizar pueden usar el proveedor de autenticaci\u00f3n `http_basic` integrado en Data Prepper y/o agregar un proxy de autenticaci\u00f3n frente a las instancias de Data Prepper que ejecutan la fuente de registros de OpenTelemetry."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "security-advisories@github.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:N/I:L/A:H",
"baseScore": 6.9,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "HIGH",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "LOW",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 1.6,
"impactScore": 4.7
}
]
},
"weaknesses": [
{
"source": "security-advisories@github.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-287"
}
]
}
],
"references": [
{
"url": "https://github.com/opensearch-project/data-prepper/security/advisories/GHSA-725p-63vv-v948",
"source": "security-advisories@github.com"
}
]
}