Lucene search

K
cveGitHub_MCVE-2024-43397
HistoryAug 20, 2024 - 3:15 p.m.

CVE-2024-43397

2024-08-2015:15:23
CWE-284
GitHub_M
web.nvd.nist.gov
27
apollo
configuration management
synchronization feature
vulnerability
permission checks
namespace
input parameter check
version 2.3.0

CVSS3

4.3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

LOW

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N

AI Score

4.3

Confidence

High

EPSS

0.001

Percentile

21.3%

Apollo is a configuration management system. A vulnerability exists in the synchronization configuration feature that allows users to craft specific requests to bypass permission checks. This exploit enables them to modify a namespace without the necessary permissions. The issue was addressed with an input parameter check which was released in version 2.3.0.

Affected configurations

Nvd
Vulners
Node
apolloconfigapolloRange<2.3.0
VendorProductVersionCPE
apolloconfigapollo*cpe:2.3:a:apolloconfig:apollo:*:*:*:*:*:*:*:*

CNA Affected

[
  {
    "vendor": "apolloconfig",
    "product": "apollo",
    "versions": [
      {
        "version": "< 2.3.0",
        "status": "affected"
      }
    ]
  }
]

CVSS3

4.3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

LOW

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N

AI Score

4.3

Confidence

High

EPSS

0.001

Percentile

21.3%