2024-07-14 02:06:08 +00:00

82 lines
4.0 KiB
JSON

{
"id": "CVE-2024-6598",
"sourceIdentifier": "security@knime.com",
"published": "2024-07-09T14:15:04.803",
"lastModified": "2024-07-09T18:19:14.047",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A denial-of-service attack is possible through the execution functionality of KNIME Business Hub 1.10.0 and 1.10.1. It allows an authenticated attacker with job execution privileges to execute a job that causes internal messages to pile up until there are no more resources available for processing new messages. This leads to an outage of most functionality of KNIME Business Hub. Recovery from the situation is only possible by manual administrator interaction. Please contact our support for instructions in case you have run into this situation.\n\n\nUpdating to KNIME Business Hub 1.10.2 or later solves the problem."
},
{
"lang": "es",
"value": "Es posible un ataque de denegaci\u00f3n de servicio mediante la funcionalidad de ejecuci\u00f3n de KNIME Business Hub 1.10.0 y 1.10.1. Permite que un atacante autenticado con privilegios de ejecuci\u00f3n de trabajos ejecute un trabajo que hace que los mensajes internos se acumulen hasta que no haya m\u00e1s recursos disponibles para procesar mensajes nuevos. Esto provoca una interrupci\u00f3n de la mayor parte de las funciones de KNIME Business Hub. La recuperaci\u00f3n de la situaci\u00f3n s\u00f3lo es posible mediante la interacci\u00f3n manual del administrador. Comun\u00edquese con nuestro soporte para obtener instrucciones en caso de que se haya encontrado con esta situaci\u00f3n. La actualizaci\u00f3n a KNIME Business Hub 1.10.2 o posterior resuelve el problema."
}
],
"metrics": {
"cvssMetricV40": [
{
"source": "security@knime.com",
"type": "Secondary",
"cvssData": {
"version": "4.0",
"vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"attackRequirements": "NONE",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"vulnerableSystemConfidentiality": "NONE",
"vulnerableSystemIntegrity": "NONE",
"vulnerableSystemAvailability": "HIGH",
"subsequentSystemConfidentiality": "NONE",
"subsequentSystemIntegrity": "NONE",
"subsequentSystemAvailability": "NONE",
"exploitMaturity": "NOT_DEFINED",
"confidentialityRequirements": "NOT_DEFINED",
"integrityRequirements": "NOT_DEFINED",
"availabilityRequirements": "NOT_DEFINED",
"modifiedAttackVector": "NOT_DEFINED",
"modifiedAttackComplexity": "NOT_DEFINED",
"modifiedAttackRequirements": "NOT_DEFINED",
"modifiedPrivilegesRequired": "NOT_DEFINED",
"modifiedUserInteraction": "NOT_DEFINED",
"modifiedVulnerableSystemConfidentiality": "NOT_DEFINED",
"modifiedVulnerableSystemIntegrity": "NOT_DEFINED",
"modifiedVulnerableSystemAvailability": "NOT_DEFINED",
"modifiedSubsequentSystemConfidentiality": "NOT_DEFINED",
"modifiedSubsequentSystemIntegrity": "NOT_DEFINED",
"modifiedSubsequentSystemAvailability": "NOT_DEFINED",
"safety": "NOT_DEFINED",
"automatable": "NOT_DEFINED",
"recovery": "NOT_DEFINED",
"valueDensity": "NOT_DEFINED",
"vulnerabilityResponseEffort": "NOT_DEFINED",
"providerUrgency": "NOT_DEFINED",
"baseScore": 7.1,
"baseSeverity": "HIGH"
}
}
]
},
"weaknesses": [
{
"source": "security@knime.com",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-770"
}
]
}
],
"references": [
{
"url": "https://www.knime.com/security/advisories#CVE-2024-6598",
"source": "security@knime.com"
}
]
}