mirror of
https://github.com/fkie-cad/nvd-json-data-feeds.git
synced 2025-05-28 17:21:36 +00:00
110 lines
5.1 KiB
JSON
110 lines
5.1 KiB
JSON
{
|
|
"id": "CVE-2024-42364",
|
|
"sourceIdentifier": "security-advisories@github.com",
|
|
"published": "2024-08-23T16:15:06.510",
|
|
"lastModified": "2024-09-12T18:20:20.257",
|
|
"vulnStatus": "Analyzed",
|
|
"cveTags": [],
|
|
"descriptions": [
|
|
{
|
|
"lang": "en",
|
|
"value": "Homepage is a highly customizable homepage with Docker and service API integrations. The default setup of homepage 0.9.1 is vulnerable to DNS rebinding. Homepage is setup without certificate and authentication by default, leaving it to vulnerable to DNS rebinding. In this attack, an attacker will ask a user to visit his/her website. The attacker website will then change the DNS records of their domain from their IP address to the internal IP address of the homepage instance. To tell which IP addresses are valid, we can rebind a subdomain to each IP address we want to check, and see if there is a response. Once potential candidates have been found, the attacker can launch the attack by reading the response of the webserver after the IP address has changed. When the attacker domain is fetched, the response will be from the homepage instance, not the attacker website, because the IP address has been changed. Due to a lack of authentication, a user\u2019s private information such as API keys (fixed after first report) and other private information can then be extracted by the attacker website."
|
|
},
|
|
{
|
|
"lang": "es",
|
|
"value": "La p\u00e1gina de inicio es una p\u00e1gina de inicio altamente personalizable con integraciones de API de servicios y Docker. La configuraci\u00f3n predeterminada de la p\u00e1gina de inicio 0.9.1 es vulnerable a la nueva vinculaci\u00f3n de DNS. La p\u00e1gina de inicio est\u00e1 configurada sin certificado ni autenticaci\u00f3n de forma predeterminada, lo que la deja vulnerable a la nueva vinculaci\u00f3n de DNS. En este ataque, un atacante pedir\u00e1 al usuario que visite su sitio web. Luego, el sitio web del atacante cambiar\u00e1 los registros DNS de su dominio de su direcci\u00f3n IP a la direcci\u00f3n IP interna de la instancia de la p\u00e1gina de inicio. Para saber qu\u00e9 direcciones IP son v\u00e1lidas, podemos volver a vincular un subdominio a cada direcci\u00f3n IP que queramos verificar y ver si hay una respuesta. Una vez que se han encontrado candidatos potenciales, el atacante puede lanzar el ataque leyendo la respuesta del servidor web despu\u00e9s de que la direcci\u00f3n IP haya cambiado. Cuando se recupera el dominio del atacante, la respuesta ser\u00e1 de la instancia de la p\u00e1gina de inicio, no del sitio web del atacante, porque se cambi\u00f3 la direcci\u00f3n IP. Debido a la falta de autenticaci\u00f3n, el sitio web del atacante puede extraer la informaci\u00f3n privada de un usuario, como las claves API (solucionadas despu\u00e9s del primer informe) y otra informaci\u00f3n privada."
|
|
}
|
|
],
|
|
"metrics": {
|
|
"cvssMetricV31": [
|
|
{
|
|
"source": "security-advisories@github.com",
|
|
"type": "Secondary",
|
|
"cvssData": {
|
|
"version": "3.1",
|
|
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N",
|
|
"baseScore": 6.5,
|
|
"baseSeverity": "MEDIUM",
|
|
"attackVector": "NETWORK",
|
|
"attackComplexity": "LOW",
|
|
"privilegesRequired": "NONE",
|
|
"userInteraction": "REQUIRED",
|
|
"scope": "UNCHANGED",
|
|
"confidentialityImpact": "HIGH",
|
|
"integrityImpact": "NONE",
|
|
"availabilityImpact": "NONE"
|
|
},
|
|
"exploitabilityScore": 2.8,
|
|
"impactScore": 3.6
|
|
},
|
|
{
|
|
"source": "nvd@nist.gov",
|
|
"type": "Primary",
|
|
"cvssData": {
|
|
"version": "3.1",
|
|
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N",
|
|
"baseScore": 6.5,
|
|
"baseSeverity": "MEDIUM",
|
|
"attackVector": "NETWORK",
|
|
"attackComplexity": "LOW",
|
|
"privilegesRequired": "NONE",
|
|
"userInteraction": "REQUIRED",
|
|
"scope": "UNCHANGED",
|
|
"confidentialityImpact": "HIGH",
|
|
"integrityImpact": "NONE",
|
|
"availabilityImpact": "NONE"
|
|
},
|
|
"exploitabilityScore": 2.8,
|
|
"impactScore": 3.6
|
|
}
|
|
]
|
|
},
|
|
"weaknesses": [
|
|
{
|
|
"source": "security-advisories@github.com",
|
|
"type": "Secondary",
|
|
"description": [
|
|
{
|
|
"lang": "en",
|
|
"value": "CWE-350"
|
|
}
|
|
]
|
|
},
|
|
{
|
|
"source": "nvd@nist.gov",
|
|
"type": "Primary",
|
|
"description": [
|
|
{
|
|
"lang": "en",
|
|
"value": "CWE-290"
|
|
}
|
|
]
|
|
}
|
|
],
|
|
"configurations": [
|
|
{
|
|
"nodes": [
|
|
{
|
|
"operator": "OR",
|
|
"negate": false,
|
|
"cpeMatch": [
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:gethomepage:homepage:0.9.1:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "006F151B-2614-40B7-A62E-1827067AEF77"
|
|
}
|
|
]
|
|
}
|
|
]
|
|
}
|
|
],
|
|
"references": [
|
|
{
|
|
"url": "https://securitylab.github.com/advisories/GHSL-2024-096_homepage/",
|
|
"source": "security-advisories@github.com",
|
|
"tags": [
|
|
"Third Party Advisory"
|
|
]
|
|
}
|
|
]
|
|
} |