Lucene search

K
vulnrichmentGitHub_MVULNRICHMENT:CVE-2024-39909
HistoryJul 12, 2024 - 2:34 p.m.

CVE-2024-39909 SQL Injection in the KubeClarity REST API

2024-07-1214:34:25
CWE-89
GitHub_M
github.com
6
sql injection
kubeclarity
rest api
sbom
container images
filesystems
packageid
fmt.sprintf
validation
2.23.1

CVSS3

6.5

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

NONE

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N

AI Score

8

Confidence

Low

EPSS

0

Percentile

15.9%

SSVC

Exploitation

poc

Automatable

no

Technical Impact

partial

KubeClarity is a tool for detection and management of Software Bill Of Materials (SBOM) and vulnerabilities of container images and filesystems. A time/boolean SQL Injection is present in the following resource /api/applicationResources via the following parameter packageID. As it can be seen in backend/pkg/database/id_view.go, while building the SQL Query the fmt.Sprintf function is used to build the query string without the input having first been subjected to any validation. This vulnerability is fixed in 2.23.1.

ADP Affected

[
  {
    "cpes": [
      "cpe:2.3:a:openclarity:kubeclarity:*:*:*:*:*:*:*:*"
    ],
    "vendor": "openclarity",
    "product": "kubeclarity",
    "versions": [
      {
        "status": "affected",
        "version": "0",
        "lessThan": "2.23.1",
        "versionType": "custom"
      }
    ],
    "defaultStatus": "unknown"
  }
]

CVSS3

6.5

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

NONE

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N

AI Score

8

Confidence

Low

EPSS

0

Percentile

15.9%

SSVC

Exploitation

poc

Automatable

no

Technical Impact

partial

Related for VULNRICHMENT:CVE-2024-39909