Lucene search

K
cveGitHub_MCVE-2023-48225
HistoryDec 12, 2023 - 9:15 p.m.

CVE-2023-48225

2023-12-1221:15:08
CWE-200
GitHub_M
web.nvd.nist.gov
7
laf
cloud
development
platform
security
vulnerability
sensitive information
leakage
privatization
environment
nvd
cve-2023-48225

CVSS3

9.1

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N

AI Score

8.9

Confidence

High

EPSS

0.001

Percentile

29.5%

Laf is a cloud development platform. Prior to version 1.0.0-beta.13, the control of LAF app enV is not strict enough, and in certain scenarios of privatization environment, it may lead to sensitive information leakage in secret and configmap. In ES6 syntax, if an obj directly references another obj, the name of the obj itself will be used as the key, and the entire object structure will be integrated intact. When constructing the deployment instance of the app, env was found from the database and directly inserted into the template, resulting in controllability here. Sensitive information in the secret and configmap can be read through the k8s envFrom field. In a privatization environment, when namespaceConf. fixed is marked, it may lead to the leakage of sensitive information in the system. As of time of publication, it is unclear whether any patches or workarounds exist.

Affected configurations

Nvd
Vulners
Node
laflafMatch0.1.5
OR
laflafMatch0.4.0
OR
laflafMatch0.4.1
OR
laflafMatch0.4.2
OR
laflafMatch0.4.3
OR
laflafMatch0.4.4
OR
laflafMatch0.4.5
OR
laflafMatch0.4.6
OR
laflafMatch0.4.7
OR
laflafMatch0.4.8
OR
laflafMatch0.4.9
OR
laflafMatch0.4.10
OR
laflafMatch0.4.11
OR
laflafMatch0.4.12
OR
laflafMatch0.4.13
OR
laflafMatch0.4.14
OR
laflafMatch0.4.15
OR
laflafMatch0.4.16
OR
laflafMatch0.4.17
OR
laflafMatch0.4.18
OR
laflafMatch0.4.19
OR
laflafMatch0.4.20
OR
laflafMatch0.4.21alpha0
OR
laflafMatch0.5.0
OR
laflafMatch0.5.0alpha0
OR
laflafMatch0.5.0alpha1
OR
laflafMatch0.5.0alpha2
OR
laflafMatch0.5.0alpha3
OR
laflafMatch0.5.1
OR
laflafMatch0.5.1alpha0
OR
laflafMatch0.5.2
OR
laflafMatch0.5.2alpha0
OR
laflafMatch0.5.3
OR
laflafMatch0.5.4
OR
laflafMatch0.5.4alpha0
OR
laflafMatch0.5.5
OR
laflafMatch0.5.5alpha0
OR
laflafMatch0.5.6
OR
laflafMatch0.5.7
OR
laflafMatch0.5.7alpha0
OR
laflafMatch0.5.8alpha0
OR
laflafMatch0.6.0
OR
laflafMatch0.6.0alpha0
OR
laflafMatch0.6.0alpha1
OR
laflafMatch0.6.0alpha10
OR
laflafMatch0.6.0alpha2
OR
laflafMatch0.6.0alpha3
OR
laflafMatch0.6.0alpha4
OR
laflafMatch0.6.0alpha5
OR
laflafMatch0.6.0alpha6
OR
laflafMatch0.6.0alpha7
OR
laflafMatch0.6.0alpha8
OR
laflafMatch0.6.0alpha9
OR
laflafMatch0.6.1
OR
laflafMatch0.6.2
OR
laflafMatch0.6.3
OR
laflafMatch0.6.4
OR
laflafMatch0.6.5
OR
laflafMatch0.6.6
OR
laflafMatch0.6.7
OR
laflafMatch0.6.8
OR
laflafMatch0.6.9
OR
laflafMatch0.6.10
OR
laflafMatch0.6.11
OR
laflafMatch0.6.12
OR
laflafMatch0.6.13
OR
laflafMatch0.6.14
OR
laflafMatch0.6.15
OR
laflafMatch0.6.16
OR
laflafMatch0.6.17
OR
laflafMatch0.6.18
OR
laflafMatch0.6.19
OR
laflafMatch0.6.20
OR
laflafMatch0.6.21
OR
laflafMatch0.6.22
OR
laflafMatch0.6.23
OR
laflafMatch0.7.0
OR
laflafMatch0.7.1
OR
laflafMatch0.7.2
OR
laflafMatch0.7.3
OR
laflafMatch0.7.4
OR
laflafMatch0.7.5
OR
laflafMatch0.7.6
OR
laflafMatch0.7.7
OR
laflafMatch0.7.8
OR
laflafMatch0.7.9
OR
laflafMatch0.7.10
OR
laflafMatch0.7.11
OR
laflafMatch0.8.0
OR
laflafMatch0.8.0alpha0
OR
laflafMatch0.8.0alpha1
OR
laflafMatch0.8.0alpha10
OR
laflafMatch0.8.0alpha11
OR
laflafMatch0.8.0alpha2
OR
laflafMatch0.8.0alpha3
OR
laflafMatch0.8.0alpha4
OR
laflafMatch0.8.0alpha5
OR
laflafMatch0.8.0alpha6
OR
laflafMatch0.8.0alpha7
OR
laflafMatch0.8.0alpha8
OR
laflafMatch0.8.0alpha9
OR
laflafMatch0.8.1
OR
laflafMatch0.8.2
OR
laflafMatch0.8.3
OR
laflafMatch0.8.4
OR
laflafMatch0.8.5
OR
laflafMatch0.8.5alpha0
OR
laflafMatch0.8.6
OR
laflafMatch0.8.7
OR
laflafMatch0.8.7alpha0
OR
laflafMatch0.8.7alpha1
OR
laflafMatch0.8.7alpha2
OR
laflafMatch0.8.7alpha3
OR
laflafMatch0.8.8
OR
laflafMatch0.8.9
OR
laflafMatch0.8.10
OR
laflafMatch0.8.11
OR
laflafMatch0.8.12
OR
laflafMatch0.8.13
OR
laflafMatch1.0.0alpha0
OR
laflafMatch1.0.0alpha1
OR
laflafMatch1.0.0alpha2
OR
laflafMatch1.0.0alpha3
OR
laflafMatch1.0.0alpha4
OR
laflafMatch1.0.0alpha5
OR
laflafMatch1.0.0alpha6
OR
laflafMatch1.0.0beta0
OR
laflafMatch1.0.0beta1
OR
laflafMatch1.0.0beta10
OR
laflafMatch1.0.0beta11
OR
laflafMatch1.0.0beta12
OR
laflafMatch1.0.0beta13
OR
laflafMatch1.0.0beta2
OR
laflafMatch1.0.0beta3
OR
laflafMatch1.0.0beta4
OR
laflafMatch1.0.0beta5
OR
laflafMatch1.0.0beta6
OR
laflafMatch1.0.0beta7
OR
laflafMatch1.0.0beta8
OR
laflafMatch1.0.0beta9
VendorProductVersionCPE
laflaf0.1.5cpe:2.3:a:laf:laf:0.1.5:*:*:*:*:*:*:*
laflaf0.4.0cpe:2.3:a:laf:laf:0.4.0:*:*:*:*:*:*:*
laflaf0.4.1cpe:2.3:a:laf:laf:0.4.1:*:*:*:*:*:*:*
laflaf0.4.2cpe:2.3:a:laf:laf:0.4.2:*:*:*:*:*:*:*
laflaf0.4.3cpe:2.3:a:laf:laf:0.4.3:*:*:*:*:*:*:*
laflaf0.4.4cpe:2.3:a:laf:laf:0.4.4:*:*:*:*:*:*:*
laflaf0.4.5cpe:2.3:a:laf:laf:0.4.5:*:*:*:*:*:*:*
laflaf0.4.6cpe:2.3:a:laf:laf:0.4.6:*:*:*:*:*:*:*
laflaf0.4.7cpe:2.3:a:laf:laf:0.4.7:*:*:*:*:*:*:*
laflaf0.4.8cpe:2.3:a:laf:laf:0.4.8:*:*:*:*:*:*:*
Rows per page:
1-10 of 1401

CNA Affected

[
  {
    "vendor": "labring",
    "product": "laf",
    "versions": [
      {
        "version": "< 1.0.0-beta13",
        "status": "affected"
      }
    ]
  }
]

CVSS3

9.1

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N

AI Score

8.9

Confidence

High

EPSS

0.001

Percentile

29.5%

Related for CVE-2023-48225