mirror of
https://github.com/fkie-cad/nvd-json-data-feeds.git
synced 2025-05-28 09:11:28 +00:00
60 lines
2.7 KiB
JSON
60 lines
2.7 KiB
JSON
{
|
|
"id": "CVE-2024-54002",
|
|
"sourceIdentifier": "security-advisories@github.com",
|
|
"published": "2024-12-04T16:15:26.537",
|
|
"lastModified": "2024-12-04T16:15:26.537",
|
|
"vulnStatus": "Awaiting Analysis",
|
|
"cveTags": [],
|
|
"descriptions": [
|
|
{
|
|
"lang": "en",
|
|
"value": "Dependency-Track is a Component Analysis platform that allows organizations to identify and reduce risk in the software supply chain. Performing a login request against the /api/v1/user/login endpoint with a username that exist in the system takes significantly longer than performing the same action with a username that is not known by the system. The observable difference in request duration can be leveraged by actors to enumerate valid names of managed users. LDAP and OpenID Connect users are not affected. The issue has been fixed in Dependency-Track 4.12.2."
|
|
},
|
|
{
|
|
"lang": "es",
|
|
"value": "Dependency-Track es una plataforma de an\u00e1lisis de componentes que permite a las organizaciones identificar y reducir los riesgos en la cadena de suministro de software. Realizar una solicitud de inicio de sesi\u00f3n en el punto de conexi\u00f3n /api/v1/user/login con un nombre de usuario que existe en el sistema lleva mucho m\u00e1s tiempo que realizar la misma acci\u00f3n con un nombre de usuario que el sistema no conoce. Los actores pueden aprovechar la diferencia observable en la duraci\u00f3n de la solicitud para enumerar los nombres v\u00e1lidos de los usuarios administrados. Los usuarios de LDAP y OpenID Connect no se ven afectados. El problema se ha solucionado en Dependency-Track 4.12.2."
|
|
}
|
|
],
|
|
"metrics": {
|
|
"cvssMetricV31": [
|
|
{
|
|
"source": "security-advisories@github.com",
|
|
"type": "Secondary",
|
|
"cvssData": {
|
|
"version": "3.1",
|
|
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N",
|
|
"baseScore": 5.3,
|
|
"baseSeverity": "MEDIUM",
|
|
"attackVector": "NETWORK",
|
|
"attackComplexity": "LOW",
|
|
"privilegesRequired": "NONE",
|
|
"userInteraction": "NONE",
|
|
"scope": "UNCHANGED",
|
|
"confidentialityImpact": "LOW",
|
|
"integrityImpact": "NONE",
|
|
"availabilityImpact": "NONE"
|
|
},
|
|
"exploitabilityScore": 3.9,
|
|
"impactScore": 1.4
|
|
}
|
|
]
|
|
},
|
|
"weaknesses": [
|
|
{
|
|
"source": "security-advisories@github.com",
|
|
"type": "Secondary",
|
|
"description": [
|
|
{
|
|
"lang": "en",
|
|
"value": "CWE-203"
|
|
}
|
|
]
|
|
}
|
|
],
|
|
"references": [
|
|
{
|
|
"url": "https://github.com/DependencyTrack/dependency-track/security/advisories/GHSA-9w3m-hm36-w32w",
|
|
"source": "security-advisories@github.com"
|
|
}
|
|
]
|
|
} |