mirror of
https://github.com/fkie-cad/nvd-json-data-feeds.git
synced 2025-05-28 17:21:36 +00:00
71 lines
2.7 KiB
JSON
71 lines
2.7 KiB
JSON
{
|
|
"id": "CVE-2024-27138",
|
|
"sourceIdentifier": "security@apache.org",
|
|
"published": "2024-03-01T16:15:45.983",
|
|
"lastModified": "2024-08-21T21:35:04.820",
|
|
"vulnStatus": "Awaiting Analysis",
|
|
"cveTags": [
|
|
{
|
|
"sourceIdentifier": "security@apache.org",
|
|
"tags": [
|
|
"unsupported-when-assigned"
|
|
]
|
|
}
|
|
],
|
|
"descriptions": [
|
|
{
|
|
"lang": "en",
|
|
"value": "** UNSUPPORTED WHEN ASSIGNED ** Incorrect Authorization vulnerability in Apache Archiva.\n\nApache Archiva has a setting to disable user registration, however this restriction can be bypassed. As Apache Archiva has been retired, we do not expect to release a version of Apache Archiva that fixes this issue. You are recommended to look into migrating to a different solution, or isolate your instance from any untrusted users.\n\nNOTE: This vulnerability only affects products that are no longer supported by the maintainer\n\n"
|
|
},
|
|
{
|
|
"lang": "es",
|
|
"value": "** NO SOPORTADO CUANDO SE ASIGN\u00d3 ** Vulnerabilidad de autorizaci\u00f3n incorrecta en Apache Archiva. Apache Archiva tiene una configuraci\u00f3n para deshabilitar el registro de usuarios; sin embargo, esta restricci\u00f3n se puede evitar. Como Apache Archiva ha sido retirado, no esperamos lanzar una versi\u00f3n de Apache Archiva que solucione este problema. Se recomienda considerar la posibilidad de migrar a una soluci\u00f3n diferente o aislar su instancia de usuarios que no sean de confianza. NOTA: Esta vulnerabilidad solo afecta a productos que ya no son compatibles con el fabricante"
|
|
}
|
|
],
|
|
"metrics": {
|
|
"cvssMetricV31": [
|
|
{
|
|
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
|
"type": "Secondary",
|
|
"cvssData": {
|
|
"version": "3.1",
|
|
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N",
|
|
"attackVector": "NETWORK",
|
|
"attackComplexity": "LOW",
|
|
"privilegesRequired": "NONE",
|
|
"userInteraction": "NONE",
|
|
"scope": "UNCHANGED",
|
|
"confidentialityImpact": "NONE",
|
|
"integrityImpact": "HIGH",
|
|
"availabilityImpact": "NONE",
|
|
"baseScore": 7.5,
|
|
"baseSeverity": "HIGH"
|
|
},
|
|
"exploitabilityScore": 3.9,
|
|
"impactScore": 3.6
|
|
}
|
|
]
|
|
},
|
|
"weaknesses": [
|
|
{
|
|
"source": "security@apache.org",
|
|
"type": "Primary",
|
|
"description": [
|
|
{
|
|
"lang": "en",
|
|
"value": "CWE-863"
|
|
}
|
|
]
|
|
}
|
|
],
|
|
"references": [
|
|
{
|
|
"url": "http://www.openwall.com/lists/oss-security/2024/03/01/4",
|
|
"source": "security@apache.org"
|
|
},
|
|
{
|
|
"url": "https://lists.apache.org/thread/070qcpclcb3sqk1hn8j5lvzohp30k1m2",
|
|
"source": "security@apache.org"
|
|
}
|
|
]
|
|
} |