Lucene search

K
vulnrichmentGitHub_MVULNRICHMENT:CVE-2024-43397
HistoryAug 20, 2024 - 2:50 p.m.

CVE-2024-43397 Potential unauthorized access issue in apollo-portal

2024-08-2014:50:01
CWE-284
GitHub_M
github.com
1
cve-2024-43397
apollo-portal
configuration management
synchronization
permission checks
exploit
namespace modification
input parameter check
version 2.3.0

CVSS3

4.3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

LOW

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N

AI Score

6.6

Confidence

Low

EPSS

0.001

Percentile

21.3%

SSVC

Exploitation

none

Automatable

no

Technical Impact

partial

Apollo is a configuration management system. A vulnerability exists in the synchronization configuration feature that allows users to craft specific requests to bypass permission checks. This exploit enables them to modify a namespace without the necessary permissions. The issue was addressed with an input parameter check which was released in version 2.3.0.

CNA Affected

[
  {
    "vendor": "apolloconfig",
    "product": "apollo",
    "versions": [
      {
        "status": "affected",
        "version": "< 2.3.0"
      }
    ]
  }
]

CVSS3

4.3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

LOW

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N

AI Score

6.6

Confidence

Low

EPSS

0.001

Percentile

21.3%

SSVC

Exploitation

none

Automatable

no

Technical Impact

partial

Related for VULNRICHMENT:CVE-2024-43397