mirror of
https://github.com/fkie-cad/nvd-json-data-feeds.git
synced 2025-06-19 17:31:42 +00:00
60 lines
2.9 KiB
JSON
60 lines
2.9 KiB
JSON
{
|
|
"id": "CVE-2024-2321",
|
|
"sourceIdentifier": "ed10eef1-636d-4fbe-9993-6890dfa878f8",
|
|
"published": "2025-02-27T05:15:13.797",
|
|
"lastModified": "2025-02-27T05:15:13.797",
|
|
"vulnStatus": "Awaiting Analysis",
|
|
"cveTags": [],
|
|
"descriptions": [
|
|
{
|
|
"lang": "en",
|
|
"value": "An incorrect authorization vulnerability exists in multiple WSO2 products, allowing protected APIs to be accessed directly using a refresh token instead of the expected access token. Due to improper authorization checks and token mapping, session cookies are not required for API access, potentially enabling unauthorized operations.\n\nExploitation requires an attacker to obtain a valid refresh token of an admin user. Since refresh tokens generally have a longer expiration time, this could lead to prolonged unauthorized access to API resources, impacting data confidentiality and integrity."
|
|
},
|
|
{
|
|
"lang": "es",
|
|
"value": "Existe una vulnerabilidad de autorizaci\u00f3n incorrecta en varios productos WSO2, que permite acceder a las API protegidas directamente mediante un token de actualizaci\u00f3n en lugar del token de acceso esperado. Debido a las comprobaciones de autorizaci\u00f3n y la asignaci\u00f3n de tokens incorrectas, no se requieren cookies de sesi\u00f3n para el acceso a la API, lo que potencialmente permite operaciones no autorizadas. Para explotar esta vulnerabilidad, es necesario que un atacante obtenga un token de actualizaci\u00f3n v\u00e1lido de un usuario administrador. Dado que los tokens de actualizaci\u00f3n generalmente tienen un tiempo de vencimiento m\u00e1s largo, esto podr\u00eda provocar un acceso no autorizado prolongado a los recursos de la API, lo que afecta la confidencialidad e integridad de los datos."
|
|
}
|
|
],
|
|
"metrics": {
|
|
"cvssMetricV31": [
|
|
{
|
|
"source": "ed10eef1-636d-4fbe-9993-6890dfa878f8",
|
|
"type": "Secondary",
|
|
"cvssData": {
|
|
"version": "3.1",
|
|
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L",
|
|
"baseScore": 5.6,
|
|
"baseSeverity": "MEDIUM",
|
|
"attackVector": "NETWORK",
|
|
"attackComplexity": "HIGH",
|
|
"privilegesRequired": "NONE",
|
|
"userInteraction": "NONE",
|
|
"scope": "UNCHANGED",
|
|
"confidentialityImpact": "LOW",
|
|
"integrityImpact": "LOW",
|
|
"availabilityImpact": "LOW"
|
|
},
|
|
"exploitabilityScore": 2.2,
|
|
"impactScore": 3.4
|
|
}
|
|
]
|
|
},
|
|
"weaknesses": [
|
|
{
|
|
"source": "ed10eef1-636d-4fbe-9993-6890dfa878f8",
|
|
"type": "Secondary",
|
|
"description": [
|
|
{
|
|
"lang": "en",
|
|
"value": "CWE-863"
|
|
}
|
|
]
|
|
}
|
|
],
|
|
"references": [
|
|
{
|
|
"url": "https://security.docs.wso2.com/en/latest/security-announcements/security-advisories/2024/WSO2-2024-3213/",
|
|
"source": "ed10eef1-636d-4fbe-9993-6890dfa878f8"
|
|
}
|
|
]
|
|
} |