9
CVE-2024-6834
- EPSS 0.34%
- Veröffentlicht 17.07.2024 15:15:14
- Zuletzt bearbeitet 21.11.2024 09:50:23
- Quelle zowe-security@lists.openmainfr
- Teams Watchlist Login
- Unerledigt Login
A vulnerability in APIML Spring Cloud Gateway which leverages user privileges by unexpected signing proxied request by Zowe's client certificate. This allows access to a user to the endpoints requiring an internal client certificate without any credentials. It could lead to managing components in there and allow an attacker to handle the whole communication including user credentials.
Verknüpft mit AI von unstrukturierten Daten zu bestehenden CPE der NVD
Diese Information steht angemeldeten Benutzern zur Verfügung. Login
Daten sind bereitgestellt durch das CVE Programm von Authorized Data Publishers (ADP) (Unstrukturiert)
Herstellerlinuxfoundation
≫
Produkt
zowe_api_mediation_layer
Default Statusunknown
Version <
2.14.0
Version
2.4.0
Status
affected
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
Typ | Quelle | Score | Percentile |
---|---|---|---|
EPSS | FIRST.org | 0.34% | 0.562 |
Quelle | Base Score | Exploit Score | Impact Score | Vector String |
---|---|---|---|---|
zowe-security@lists.openmainframeproject.org | 9 | 2.2 | 6 |
CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H
|
CWE-250 Execution with Unnecessary Privileges
The product performs an operation at a privilege level that is higher than the minimum level required, which creates new weaknesses or amplifies the consequences of other weaknesses.