Lucene search

K
cvelistGitHub_MCVELIST:CVE-2024-39909
HistoryJul 12, 2024 - 2:34 p.m.

CVE-2024-39909 SQL Injection in the KubeClarity REST API

2024-07-1214:34:25
CWE-89
GitHub_M
www.cve.org
3
cve-2024-39909
kubeclarity
sql injection
rest api
packageid
software bill of materials
vulnerabilities
container images
filesystems
fmt.sprintf function
validation
fixed in 2.23.1

CVSS3

6.5

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

NONE

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N

EPSS

0

Percentile

15.9%

KubeClarity is a tool for detection and management of Software Bill Of Materials (SBOM) and vulnerabilities of container images and filesystems. A time/boolean SQL Injection is present in the following resource /api/applicationResources via the following parameter packageID. As it can be seen in backend/pkg/database/id_view.go, while building the SQL Query the fmt.Sprintf function is used to build the query string without the input having first been subjected to any validation. This vulnerability is fixed in 2.23.1.

CNA Affected

[
  {
    "vendor": "openclarity",
    "product": "kubeclarity",
    "versions": [
      {
        "version": "< 2.23.1",
        "status": "affected"
      }
    ]
  }
]

CVSS3

6.5

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

NONE

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N

EPSS

0

Percentile

15.9%

Related for CVELIST:CVE-2024-39909