2025-04-08 22:03:52 +00:00

82 lines
2.6 KiB
JSON

{
"id": "CVE-2024-47212",
"sourceIdentifier": "cve@mitre.org",
"published": "2025-04-03T21:15:38.523",
"lastModified": "2025-04-08T20:06:27.003",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "An issue was discovered in Iglu Server 0.13.0 and below. It involves sending very large payloads to a particular API endpoint of Iglu Server and can render it completely unresponsive. If the operation of Iglu Server is not restored, event processing in the pipeline would eventually halt."
},
{
"lang": "es",
"value": "Se detect\u00f3 un problema en Iglu Server 0.13.0 y versiones anteriores. Este problema implica el env\u00edo de payloads muy grandes a un endpoint de API espec\u00edfico de Iglu Server, lo que puede dejarlo completamente inoperante. Si no se restablece el funcionamiento de Iglu Server, el procesamiento de eventos en la canalizaci\u00f3n podr\u00eda detenerse."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 3.9,
"impactScore": 3.6
}
]
},
"weaknesses": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-400"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:snowplow:iglu_server:*:*:*:*:*:*:*:*",
"versionEndExcluding": "0.13.1",
"matchCriteriaId": "17F959D6-182B-4438-9EC1-490A0758533F"
}
]
}
]
}
],
"references": [
{
"url": "https://support.snowplow.io/hc/en-us/articles/26318139354909-Update-Critical-Snowplow-Security-Updates-Impact-on-Open-Source-Software-Users",
"source": "cve@mitre.org",
"tags": [
"Release Notes",
"Vendor Advisory"
]
}
]
}