Lucene search

K
cveGitLabCVE-2024-6299
HistoryJun 25, 2024 - 1:15 p.m.

CVE-2024-6299

2024-06-2513:15:50
CWE-324
GitLab
web.nvd.nist.gov
26
cve-2024-6299
conduit
key expiry validation
remote server
request forging
pdus
timestamp.

CVSS3

4.8

Attack Vector

NETWORK

Attack Complexity

HIGH

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

LOW

Integrity Impact

LOW

Availability Impact

NONE

CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N

AI Score

5.2

Confidence

High

EPSS

0.001

Percentile

17.7%

Lack of consideration of key expiry when validating signatures in Conduit, allowing an attacker which has compromised an expired key to forge requests as the remote server, as well as PDUs with timestamps past the expiry date

Affected configurations

Nvd
Vulners
Node
conduitconduitRange<0.8.0
VendorProductVersionCPE
conduitconduit*cpe:2.3:a:conduit:conduit:*:*:*:*:*:*:*:*

CNA Affected

[
  {
    "defaultStatus": "unaffected",
    "product": "Conduit",
    "vendor": "The Conduit Contributors",
    "versions": [
      {
        "lessThan": "0.8.0",
        "status": "affected",
        "version": "0",
        "versionType": "semver"
      }
    ]
  }
]

CVSS3

4.8

Attack Vector

NETWORK

Attack Complexity

HIGH

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

LOW

Integrity Impact

LOW

Availability Impact

NONE

CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N

AI Score

5.2

Confidence

High

EPSS

0.001

Percentile

17.7%

Related for CVE-2024-6299