mirror of
https://github.com/fkie-cad/nvd-json-data-feeds.git
synced 2025-05-28 09:11:28 +00:00
116 lines
4.1 KiB
JSON
116 lines
4.1 KiB
JSON
{
|
|
"id": "CVE-2022-36089",
|
|
"sourceIdentifier": "security-advisories@github.com",
|
|
"published": "2022-09-07T23:15:14.240",
|
|
"lastModified": "2022-09-16T16:19:57.247",
|
|
"vulnStatus": "Analyzed",
|
|
"descriptions": [
|
|
{
|
|
"lang": "en",
|
|
"value": "KubeVela is an application delivery platform Users using KubeVela's VelaUX APIServer could be affected by an authentication bypass vulnerability. In KubeVela prior to versions 1.4.11 and 1.5.4, VelaUX APIServer uses the `PlatformID` as the signed key to generate the JWT tokens for users. Another API called `getSystemInfo` exposes the platformID. This vulnerability allows users to use the platformID to re-generate the JWT tokens to bypass the authentication. Versions 1.4.11 and 1.5.4 contain a patch for this issue."
|
|
},
|
|
{
|
|
"lang": "es",
|
|
"value": "KubeVela es una plataforma de entrega de aplicaciones Los usuarios usando VelaUX APIServer de KubeVela podr\u00edan verse afectados por una vulnerabilidad de omisi\u00f3n de autenticaci\u00f3n. En KubeVela versiones anteriores a 1.4.11 y 1.5.4, VelaUX APIServer usa el \"PlatformID\" como clave firmada para generar los tokens JWT para usuarios. Otra API llamada \"getSystemInfo\" expone el platformID. Esta vulnerabilidad permite a usuarios usar el platformID para volver a generar los tokens JWT para omitir la autenticaci\u00f3n. Las versiones 1.4.11 y 1.5.4 contienen un parche para este problema"
|
|
}
|
|
],
|
|
"metrics": {
|
|
"cvssMetricV31": [
|
|
{
|
|
"source": "nvd@nist.gov",
|
|
"type": "Primary",
|
|
"cvssData": {
|
|
"version": "3.1",
|
|
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
|
"attackVector": "NETWORK",
|
|
"attackComplexity": "LOW",
|
|
"privilegesRequired": "NONE",
|
|
"userInteraction": "NONE",
|
|
"scope": "UNCHANGED",
|
|
"confidentialityImpact": "HIGH",
|
|
"integrityImpact": "HIGH",
|
|
"availabilityImpact": "HIGH",
|
|
"baseScore": 9.8,
|
|
"baseSeverity": "CRITICAL"
|
|
},
|
|
"exploitabilityScore": 3.9,
|
|
"impactScore": 5.9
|
|
},
|
|
{
|
|
"source": "security-advisories@github.com",
|
|
"type": "Secondary",
|
|
"cvssData": {
|
|
"version": "3.1",
|
|
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:H/A:N",
|
|
"attackVector": "NETWORK",
|
|
"attackComplexity": "LOW",
|
|
"privilegesRequired": "NONE",
|
|
"userInteraction": "NONE",
|
|
"scope": "UNCHANGED",
|
|
"confidentialityImpact": "LOW",
|
|
"integrityImpact": "HIGH",
|
|
"availabilityImpact": "NONE",
|
|
"baseScore": 8.2,
|
|
"baseSeverity": "HIGH"
|
|
},
|
|
"exploitabilityScore": 3.9,
|
|
"impactScore": 4.2
|
|
}
|
|
]
|
|
},
|
|
"weaknesses": [
|
|
{
|
|
"source": "security-advisories@github.com",
|
|
"type": "Primary",
|
|
"description": [
|
|
{
|
|
"lang": "en",
|
|
"value": "CWE-294"
|
|
}
|
|
]
|
|
}
|
|
],
|
|
"configurations": [
|
|
{
|
|
"nodes": [
|
|
{
|
|
"operator": "OR",
|
|
"negate": false,
|
|
"cpeMatch": [
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:kubevela:kubevela:*:*:*:*:*:*:*:*",
|
|
"versionStartIncluding": "1.4.0",
|
|
"versionEndExcluding": "1.4.11",
|
|
"matchCriteriaId": "C957D116-0D05-45E2-BB4F-521EE62DE92F"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:kubevela:kubevela:*:*:*:*:*:*:*:*",
|
|
"versionStartIncluding": "1.5.0",
|
|
"versionEndExcluding": "1.5.3",
|
|
"matchCriteriaId": "1DAABE63-63A3-4146-B803-BB13F5CC93D2"
|
|
}
|
|
]
|
|
}
|
|
]
|
|
}
|
|
],
|
|
"references": [
|
|
{
|
|
"url": "https://github.com/kubevela/kubevela/pull/4634",
|
|
"source": "security-advisories@github.com",
|
|
"tags": [
|
|
"Third Party Advisory"
|
|
]
|
|
},
|
|
{
|
|
"url": "https://github.com/kubevela/kubevela/security/advisories/GHSA-cq42-w295-r29q",
|
|
"source": "security-advisories@github.com",
|
|
"tags": [
|
|
"Patch",
|
|
"Third Party Advisory"
|
|
]
|
|
}
|
|
]
|
|
} |