Lucene search

K
vulnrichmentGitHub_MVULNRICHMENT:CVE-2024-24757
HistoryFeb 02, 2024 - 3:37 p.m.

CVE-2024-24757 open-irs .env Exposure

2024-02-0215:37:27
CWE-200
GitHub_M
github.com
4
cve-2024-24757; open-irs; .env exposure; git actions; sensitive keys; secrets; fixed; discontinuing

CVSS3

7.6

Attack Vector

ADJACENT

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

LOW

Integrity Impact

LOW

Availability Impact

HIGH

CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:H

AI Score

6.7

Confidence

Low

SSVC

Exploitation

none

Automatable

no

Technical Impact

partial

open-irs is an issue response robot that reponds to issues in the installed repository. The .env file was accidentally uploaded when working with git actions. This problem is fixed in 1.0.1. Discontinuing all sensitive keys and turning into secrets.

CNA Affected

[
  {
    "vendor": "Degamisu",
    "product": "open-irs",
    "versions": [
      {
        "status": "affected",
        "version": "< 1.0.1"
      }
    ]
  }
]

CVSS3

7.6

Attack Vector

ADJACENT

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

LOW

Integrity Impact

LOW

Availability Impact

HIGH

CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:H

AI Score

6.7

Confidence

Low

SSVC

Exploitation

none

Automatable

no

Technical Impact

partial

Related for VULNRICHMENT:CVE-2024-24757