Lucene search

K
githubGitHub Advisory DatabaseGHSA-WJMJ-H3XC-HXP8
HistoryJun 06, 2024 - 10:58 p.m.

Generation of Error Message Containing Sensitive Information in zsa

2024-06-0622:58:46
CWE-209
GitHub Advisory Database
github.com
7
impact
user affected
sensitive information exposure
server vulnerability
unauthorized access
patch
workaround

CVSS3

4

Attack Vector

LOCAL

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

LOW

Integrity Impact

NONE

Availability Impact

NONE

CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N

AI Score

4.3

Confidence

High

EPSS

0

Percentile

9.0%

Impact

All users are impacted. The zsa application transfers the parse error stack from the server to the client in production build mode. This can potentially reveal sensitive information about the server environment, such as the machine username and directory paths. An attacker could exploit this vulnerability to gain unauthorized access to sensitive server information. This information could be used to plan further attacks or gain a deeper understanding of the server infrastructure.

Patches

Yes, this has been pathed on 0.3.3

Workarounds

No way to fix other than the patch.

Affected configurations

Vulners
Node
zsaRange<0.3.3
VendorProductVersionCPE
*zsa*cpe:2.3:a:*:zsa:*:*:*:*:*:*:*:*

CVSS3

4

Attack Vector

LOCAL

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

LOW

Integrity Impact

NONE

Availability Impact

NONE

CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N

AI Score

4.3

Confidence

High

EPSS

0

Percentile

9.0%

Related for GHSA-WJMJ-H3XC-HXP8