2024-12-15 03:03:56 +00:00

108 lines
4.1 KiB
JSON

{
"id": "CVE-2022-39238",
"sourceIdentifier": "security-advisories@github.com",
"published": "2022-09-23T08:15:09.023",
"lastModified": "2024-11-21T07:17:51.070",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Arvados is an open source platform for managing and analyzing biomedical big data. In versions prior to 2.4.3, when using Portable Authentication Modules (PAM) for user authentication, if a user presented valid credentials but the account is disabled or otherwise not allowed to access the host (such as an expired password), it would still be accepted for access to Arvados. Other authentication methods (LDAP, OpenID Connect) supported by Arvados are not affected by this flaw. This issue is patched in version 2.4.3. Workaround for this issue is to migrate to a different authentication method supported by Arvados, such as LDAP."
},
{
"lang": "es",
"value": "Arvados es una plataforma de c\u00f3digo abierto para administrar y analizar big data biom\u00e9dico. En versiones anteriores a 2.4.3, cuando eran usados M\u00f3dulos de Autenticaci\u00f3n Port\u00e1tiles (PAM) para la autenticaci\u00f3n de usuarios, si un usuario presentaba credenciales v\u00e1lidas pero la cuenta estaba deshabilitada o no ten\u00eda permiso para acceder al host (como una contrase\u00f1a caducada), segu\u00eda siendo aceptada para acceder a Arvados. Otros m\u00e9todos de autenticaci\u00f3n (LDAP, OpenID Connect) soportados por Arvados no est\u00e1n afectados por este fallo. Este problema est\u00e1 parcheado en versi\u00f3n 2.4.3. La mitigaci\u00f3n a este problema es migrar a un m\u00e9todo de autenticaci\u00f3n diferente soportado por Arvados, como LDAP."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "security-advisories@github.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:N",
"baseScore": 4.2,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "HIGH",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 1.6,
"impactScore": 2.5
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 2.8,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "security-advisories@github.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-287"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:arvados:arvados:*:*:*:*:*:ruby:*:*",
"versionEndExcluding": "2.4.3",
"matchCriteriaId": "AC71C425-D344-4352-8C95-6B8AE7AAFB19"
}
]
}
]
}
],
"references": [
{
"url": "https://github.com/arvados/arvados/security/advisories/GHSA-87jr-xwhg-cxjv",
"source": "security-advisories@github.com",
"tags": [
"Third Party Advisory"
]
},
{
"url": "https://github.com/arvados/arvados/security/advisories/GHSA-87jr-xwhg-cxjv",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
]
}
]
}