2024-07-14 02:06:08 +00:00

119 lines
4.1 KiB
JSON

{
"id": "CVE-2023-39438",
"sourceIdentifier": "cna@sap.com",
"published": "2023-08-15T17:15:12.627",
"lastModified": "2023-08-22T17:32:59.287",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A missing authorization check allows an arbitrary authenticated user to perform certain operations through the API of CLA-assistant by executing specific additional steps. This allows an arbitrary authenticated user to read CLA information including information of the persons who signed them as well as custom fields the CLA requester had configured. In addition, an arbitrary authenticated user can update or delete the CLA-configuration for repositories or organizations using CLA-assistant. The stored access tokens for GitHub are not affected, as these are redacted from the API-responses.\n"
},
{
"lang": "es",
"value": "Una comprobaci\u00f3n de autorizaci\u00f3n omitida permite a un usuario autenticado arbitrario realizar ciertas operaciones a trav\u00e9s de la API de CLA-assistant mediante la ejecuci\u00f3n de pasos adicionales espec\u00edficos. Esto permite a un usuario autenticado arbitrario leer informaci\u00f3n CLA incluyendo informaci\u00f3n de las personas que los firmaron as\u00ed como campos personalizados que el solicitante CLA hab\u00eda configurado. Adem\u00e1s, un usuario autenticado arbitrario puede actualizar o eliminar la configuraci\u00f3n CLA para repositorios u organizaciones utilizando CLA-assistant. Los tokens de acceso almacenados para GitHub no se ven afectados, ya que se eliminan de las respuestas de la API."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "NONE",
"baseScore": 8.1,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 2.8,
"impactScore": 5.2
},
{
"source": "cna@sap.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "NONE",
"baseScore": 8.1,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 2.8,
"impactScore": 5.2
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-862"
}
]
},
{
"source": "cna@sap.com",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-424"
},
{
"lang": "en",
"value": "CWE-862"
},
{
"lang": "en",
"value": "CWE-863"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:sap:contributor_license_agreement_assistant:*:*:*:*:*:*:*:*",
"versionEndExcluding": "2.13.1",
"matchCriteriaId": "6EE782C1-8A0C-465E-9D92-CCF68C05AA05"
}
]
}
]
}
],
"references": [
{
"url": "https://github.com/cla-assistant/cla-assistant/security/advisories/GHSA-gw8p-frwv-25gh",
"source": "cna@sap.com",
"tags": [
"Vendor Advisory"
]
}
]
}