Lucene search

K
cveGitHub_MCVE-2022-24721
HistoryMar 15, 2022 - 2:15 p.m.

CVE-2022-24721

2022-03-1514:15:08
CWE-863
GitHub_M
web.nvd.nist.gov
92
cometd
cve-2022-24721
security
web messaging
oort
seti
scalable
vulnerability

CVSS2

5.5

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

SINGLE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

NONE

AV:N/AC:L/Au:S/C:P/I:P/A:N

CVSS3

8.1

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N

AI Score

7.8

Confidence

High

EPSS

0.001

Percentile

46.3%

CometD is a scalable comet implementation for web messaging. In any version prior to 5.0.11, 6.0.6, and 7.0.6, internal usage of Oort and Seti channels is improperly authorized, so any remote user could subscribe and publish to those channels. By subscribing to those channels, a remote user may be able to watch cluster-internal traffic that contains other users’ (possibly sensitive) data. By publishing to those channels, a remote user may be able to create/modify/delete other user’s data and modify the cluster structure. A fix is available in versions 5.0.11, 6.0.6, and 7.0.6. As a workaround, install a custom SecurityPolicy that forbids subscription and publishing to remote, non-Oort, sessions on Oort and Seti channels.

Affected configurations

Nvd
Vulners
Node
cometdcometdRange<5.0.11
OR
cometdcometdRange6.0.06.0.6
OR
cometdcometdRange7.0.07.0.6
VendorProductVersionCPE
cometdcometd*cpe:2.3:a:cometd:cometd:*:*:*:*:*:*:*:*

CNA Affected

[
  {
    "product": "cometd",
    "vendor": "cometd",
    "versions": [
      {
        "status": "affected",
        "version": "< 5.0.11"
      },
      {
        "status": "affected",
        "version": ">= 6.0.0, < 6.0.6"
      },
      {
        "status": "affected",
        "version": ">= 7.0.0, < 7.0.6"
      }
    ]
  }
]

CVSS2

5.5

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

SINGLE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

NONE

AV:N/AC:L/Au:S/C:P/I:P/A:N

CVSS3

8.1

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N

AI Score

7.8

Confidence

High

EPSS

0.001

Percentile

46.3%