2024-11-23 15:12:23 +00:00

162 lines
6.0 KiB
JSON

{
"id": "CVE-2022-24721",
"sourceIdentifier": "security-advisories@github.com",
"published": "2022-03-15T14:15:08.247",
"lastModified": "2024-11-21T06:50:57.013",
"vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
"value": "CometD is a scalable comet implementation for web messaging. In any version prior to 5.0.11, 6.0.6, and 7.0.6, internal usage of Oort and Seti channels is improperly authorized, so any remote user could subscribe and publish to those channels. By subscribing to those channels, a remote user may be able to watch cluster-internal traffic that contains other users' (possibly sensitive) data. By publishing to those channels, a remote user may be able to create/modify/delete other user's data and modify the cluster structure. A fix is available in versions 5.0.11, 6.0.6, and 7.0.6. As a workaround, install a custom `SecurityPolicy` that forbids subscription and publishing to remote, non-Oort, sessions on Oort and Seti channels."
},
{
"lang": "es",
"value": "CometD es una implementaci\u00f3n escalable de comet para la mensajer\u00eda web. En cualquier versi\u00f3n anterior a 5.0.11, 6.0.6 y 7.0.6, el uso interno de los canales Oort y Seti est\u00e1 indebidamente autorizado, por lo que cualquier usuario remoto podr\u00eda suscribirse y publicar en esos canales. Al suscribirse a esos canales, un usuario remoto podr\u00eda visualizar el tr\u00e1fico interno del cl\u00faster que contiene datos de otros usuarios (posiblemente confidenciales). Al publicar en esos canales, un usuario remoto podr\u00eda crear/modificar/borrar los datos de otros usuarios y modificar la estructura del cl\u00faster. Se presenta una correcci\u00f3n disponible en versiones 5.0.11, 6.0.6 y 7.0.6. Como medida de mitigaci\u00f3n, instale una \"SecurityPolicy\" personalizada que proh\u00edba la suscripci\u00f3n y publicaci\u00f3n a sesiones remotas, no Oort, en los canales Oort y Seti"
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "security-advisories@github.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N",
"baseScore": 8.1,
"baseSeverity": "HIGH",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 2.8,
"impactScore": 5.2
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N",
"baseScore": 8.1,
"baseSeverity": "HIGH",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 2.8,
"impactScore": 5.2
}
],
"cvssMetricV2": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "2.0",
"vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:N",
"baseScore": 5.5,
"accessVector": "NETWORK",
"accessComplexity": "LOW",
"authentication": "SINGLE",
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"availabilityImpact": "NONE"
},
"baseSeverity": "MEDIUM",
"exploitabilityScore": 8.0,
"impactScore": 4.9,
"acInsufInfo": false,
"obtainAllPrivilege": false,
"obtainUserPrivilege": false,
"obtainOtherPrivilege": false,
"userInteractionRequired": false
}
]
},
"weaknesses": [
{
"source": "security-advisories@github.com",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-863"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:cometd:cometd:*:*:*:*:*:*:*:*",
"versionEndExcluding": "5.0.11",
"matchCriteriaId": "C396054E-E663-49EF-8212-2D3BFACDCA0A"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:cometd:cometd:*:*:*:*:*:*:*:*",
"versionStartIncluding": "6.0.0",
"versionEndExcluding": "6.0.6",
"matchCriteriaId": "431F0B99-7272-48BE-B046-65AEDF8AE02A"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:cometd:cometd:*:*:*:*:*:*:*:*",
"versionStartIncluding": "7.0.0",
"versionEndExcluding": "7.0.6",
"matchCriteriaId": "9864C8A4-84FC-4341-955F-508FDD7F876A"
}
]
}
]
}
],
"references": [
{
"url": "https://github.com/cometd/cometd/issues/1146",
"source": "security-advisories@github.com",
"tags": [
"Issue Tracking",
"Third Party Advisory"
]
},
{
"url": "https://github.com/cometd/cometd/security/advisories/GHSA-rjmq-6v55-4rjv",
"source": "security-advisories@github.com",
"tags": [
"Third Party Advisory"
]
},
{
"url": "https://github.com/cometd/cometd/issues/1146",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Issue Tracking",
"Third Party Advisory"
]
},
{
"url": "https://github.com/cometd/cometd/security/advisories/GHSA-rjmq-6v55-4rjv",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
]
}
]
}