7.3
CVE-2024-8260
- EPSS 0.14%
- Veröffentlicht 30.08.2024 13:15:12
- Zuletzt bearbeitet 19.09.2024 16:08:58
- Quelle vulnreport@tenable.com
- CVE-Watchlists
- Unerledigt
A SMB force-authentication vulnerability exists in all versions of OPA for Windows prior to v0.68.0. The vulnerability exists because of improper input validation, allowing a user to pass an arbitrary SMB share instead of a Rego file as an argument to OPA CLI or to one of the OPA Go library’s functions.
Daten sind bereitgestellt durch National Vulnerability Database (NVD)
Openpolicyagent ≫ Open Policy Agent Version < 0.68.0
| Typ | Quelle | Score | Percentile |
|---|---|---|---|
| EPSS | FIRST.org | 0.14% | 0.348 |
| Quelle | Base Score | Exploit Score | Impact Score | Vector String |
|---|---|---|---|---|
| nvd@nist.gov | 7.3 | 1.3 | 5.9 |
CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H
|
| vulnreport@tenable.com | 6.1 | 1.3 | 4.7 |
CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:L/A:L
|
CWE-294 Authentication Bypass by Capture-replay
A capture-replay flaw exists when the design of the product makes it possible for a malicious user to sniff network traffic and bypass authentication by replaying it to the server in question to the same effect as the original message (or with minor changes).