Lucene search

K
nvd[email protected]NVD:CVE-2024-43397
HistoryAug 20, 2024 - 3:15 p.m.

CVE-2024-43397

2024-08-2015:15:23
CWE-284
web.nvd.nist.gov
3
apollo
configuration management
vulnerability
synchronization
permission checks
exploit
namespace
input parameter check
version 2.3.0

CVSS3

4.3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

LOW

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N

EPSS

0.001

Percentile

21.3%

Apollo is a configuration management system. A vulnerability exists in the synchronization configuration feature that allows users to craft specific requests to bypass permission checks. This exploit enables them to modify a namespace without the necessary permissions. The issue was addressed with an input parameter check which was released in version 2.3.0.

Affected configurations

Nvd
Node
apolloconfigapolloRange<2.3.0
VendorProductVersionCPE
apolloconfigapollo*cpe:2.3:a:apolloconfig:apollo:*:*:*:*:*:*:*:*

CVSS3

4.3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

LOW

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N

EPSS

0.001

Percentile

21.3%

Related for NVD:CVE-2024-43397