mirror of
https://github.com/fkie-cad/nvd-json-data-feeds.git
synced 2025-05-28 09:11:28 +00:00
64 lines
3.4 KiB
JSON
64 lines
3.4 KiB
JSON
{
|
|
"id": "CVE-2024-43798",
|
|
"sourceIdentifier": "security-advisories@github.com",
|
|
"published": "2024-08-26T23:15:04.160",
|
|
"lastModified": "2024-08-27T13:01:37.913",
|
|
"vulnStatus": "Awaiting Analysis",
|
|
"cveTags": [],
|
|
"descriptions": [
|
|
{
|
|
"lang": "en",
|
|
"value": "Chisel is a fast TCP/UDP tunnel, transported over HTTP, secured via SSH. The Chisel server doesn't ever read the documented `AUTH` environment variable used to set credentials, which allows any unauthenticated user to connect, even if credentials were set. Anyone running the Chisel server that is using the `AUTH` environment variable to specify credentials to authenticate against is affected by this vulnerability. Chisel is often used to provide an entrypoint to a private network, which means services that are gated by Chisel may be affected. Additionally, Chisel is often used for exposing services to the internet. An attacker could MITM requests by connecting to a Chisel server and requesting to forward traffic from a remote port. This issue has been addressed in release version 1.10.0. All users are advised to upgrade. There are no known workarounds for this vulnerability."
|
|
},
|
|
{
|
|
"lang": "es",
|
|
"value": "Chisel es un t\u00fanel TCP/UDP r\u00e1pido, transportado a trav\u00e9s de HTTP y protegido mediante SSH. El servidor Chisel nunca lee la variable de entorno documentada \"AUTH\" utilizada para establecer las credenciales, lo que permite que cualquier usuario no autenticado se conecte, incluso si se configuraron las credenciales. Cualquiera que ejecute el servidor Chisel y utilice la variable de entorno `AUTH` para especificar las credenciales con las que autenticarse se ver\u00e1 afectado por esta vulnerabilidad. Chisel se utiliza a menudo para proporcionar un punto de entrada a una red privada, lo que significa que los servicios controlados por Chisel pueden verse afectados. Adem\u00e1s, Chisel se utiliza a menudo para exponer servicios a Internet. Un atacante podr\u00eda realizar solicitudes MITM conect\u00e1ndose a un servidor Chisel y solicitando reenviar tr\u00e1fico desde un puerto remoto. Este problema se solucion\u00f3 en la versi\u00f3n 1.10.0. Se recomienda a todos los usuarios que actualicen. No se conocen workarounds para esta vulnerabilidad."
|
|
}
|
|
],
|
|
"metrics": {
|
|
"cvssMetricV31": [
|
|
{
|
|
"source": "security-advisories@github.com",
|
|
"type": "Secondary",
|
|
"cvssData": {
|
|
"version": "3.1",
|
|
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N",
|
|
"baseScore": 8.6,
|
|
"baseSeverity": "HIGH",
|
|
"attackVector": "NETWORK",
|
|
"attackComplexity": "LOW",
|
|
"privilegesRequired": "NONE",
|
|
"userInteraction": "NONE",
|
|
"scope": "CHANGED",
|
|
"confidentialityImpact": "HIGH",
|
|
"integrityImpact": "NONE",
|
|
"availabilityImpact": "NONE"
|
|
},
|
|
"exploitabilityScore": 3.9,
|
|
"impactScore": 4.0
|
|
}
|
|
]
|
|
},
|
|
"weaknesses": [
|
|
{
|
|
"source": "security-advisories@github.com",
|
|
"type": "Secondary",
|
|
"description": [
|
|
{
|
|
"lang": "en",
|
|
"value": "CWE-306"
|
|
},
|
|
{
|
|
"lang": "en",
|
|
"value": "CWE-1068"
|
|
}
|
|
]
|
|
}
|
|
],
|
|
"references": [
|
|
{
|
|
"url": "https://github.com/jpillora/chisel/security/advisories/GHSA-38jh-8h67-m7mj",
|
|
"source": "security-advisories@github.com"
|
|
}
|
|
]
|
|
} |