Lucene search

K
cvelistGitHub_MCVELIST:CVE-2024-43397
HistoryAug 20, 2024 - 2:50 p.m.

CVE-2024-43397 Potential unauthorized access issue in apollo-portal

2024-08-2014:50:01
CWE-284
GitHub_M
www.cve.org
4
cve-2024-43397
apollo-portal
unauthorized access
synchronization configuration
input parameter check

CVSS3

4.3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

LOW

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N

EPSS

0.001

Percentile

21.3%

Apollo is a configuration management system. A vulnerability exists in the synchronization configuration feature that allows users to craft specific requests to bypass permission checks. This exploit enables them to modify a namespace without the necessary permissions. The issue was addressed with an input parameter check which was released in version 2.3.0.

CNA Affected

[
  {
    "vendor": "apolloconfig",
    "product": "apollo",
    "versions": [
      {
        "version": "< 2.3.0",
        "status": "affected"
      }
    ]
  }
]

CVSS3

4.3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

LOW

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N

EPSS

0.001

Percentile

21.3%

Related for CVELIST:CVE-2024-43397