Search criteria
7 vulnerabilities
CVE-2024-9802 (GCVE-0-2024-9802)
Vulnerability from cvelistv5 – Published: 2024-10-10 07:41 – Updated: 2024-10-10 14:22
VLAI?
Summary
The conformance validation endpoint is public so everybody can verify the conformance of onboarded services. The response could contain specific information about the service, including available endpoints, and swagger. It could advise about the running version of a service to an attacker. The attacker could also check if a service is running.
Severity ?
CWE
- CWE-312 - Cleartext Storage of Sensitive Information
Assigner
References
| URL | Tags | |
|---|---|---|
Impacted products
| Vendor | Product | Version | ||
|---|---|---|---|---|
| Open Mainframe Project | Zowe |
Affected:
2.11.0 , < 2.17.0
(semver)
|
Credits
Pablo Hernan Carle
Pavel Jareš
{
"containers": {
"adp": [
{
"affected": [
{
"cpes": [
"cpe:2.3:a:linuxfoundation:zowe_api_mediation_layer:*:*:*:*:*:*:*:*"
],
"defaultStatus": "unknown",
"product": "zowe_api_mediation_layer",
"vendor": "linuxfoundation",
"versions": [
{
"lessThan": "2.17.0",
"status": "affected",
"version": "2.11.0",
"versionType": "semver"
}
]
}
],
"metrics": [
{
"other": {
"content": {
"id": "CVE-2024-9802",
"options": [
{
"Exploitation": "none"
},
{
"Automatable": "yes"
},
{
"Technical Impact": "partial"
}
],
"role": "CISA Coordinator",
"timestamp": "2024-10-10T13:45:19.081095Z",
"version": "2.0.3"
},
"type": "ssvc"
}
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-312",
"description": "CWE-312 Cleartext Storage of Sensitive Information",
"lang": "en",
"type": "CWE"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2024-10-10T14:22:43.244Z",
"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"shortName": "CISA-ADP"
},
"title": "CISA ADP Vulnrichment"
}
],
"cna": {
"affected": [
{
"product": "Zowe",
"vendor": "Open Mainframe Project",
"versions": [
{
"lessThan": "2.17.0",
"status": "affected",
"version": "2.11.0",
"versionType": "semver"
}
]
}
],
"credits": [
{
"lang": "en",
"type": "finder",
"value": "Pablo Hernan Carle"
},
{
"lang": "en",
"type": "finder",
"value": "Pavel Jare\u0161"
}
],
"descriptions": [
{
"lang": "en",
"value": "The conformance validation endpoint is public so everybody can verify the conformance of onboarded services. The response could contain specific information about the service, including available endpoints, and swagger. It could advise about the running version of a service to an attacker. The attacker could also check if a service is running."
}
],
"exploits": [
{
"lang": "en",
"value": "There are no known exploits of this issue however exploits targeting this issue are publicly available."
}
],
"metrics": [
{
"cvssV3_1": {
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N/E:U/RL:O/RC:C",
"version": "3.1"
},
"format": "CVSS",
"scenarios": [
{
"lang": "en",
"value": "GENERAL"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2024-10-10T07:41:03.374Z",
"orgId": "b1336bef-059d-4e13-b11b-9a6ef21b3c78",
"shortName": "Zowe"
},
"references": [
{
"tags": [
"product"
],
"url": "https://github.com/zowe/api-layer"
}
],
"solutions": [
{
"lang": "en",
"value": "There is a fix since version 2.17.0, authentication is required for the endpoints."
}
],
"title": "Conformance validation endpoint discloses detail about service to unauthenticated users",
"workarounds": [
{
"lang": "en",
"value": "No workaround is available."
}
]
}
},
"cveMetadata": {
"assignerOrgId": "b1336bef-059d-4e13-b11b-9a6ef21b3c78",
"assignerShortName": "Zowe",
"cveId": "CVE-2024-9802",
"datePublished": "2024-10-10T07:41:03.374Z",
"dateReserved": "2024-10-10T07:41:03.236Z",
"dateUpdated": "2024-10-10T14:22:43.244Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2024-9798 (GCVE-0-2024-9798)
Vulnerability from cvelistv5 – Published: 2024-10-10 07:29 – Updated: 2024-10-10 14:21
VLAI?
Summary
The health endpoint is public so everybody can see a list of all services. It is potentially valuable information for attackers.
Severity ?
CWE
- CWE-312 - Cleartext Storage of Sensitive Information
Assigner
References
| URL | Tags | |
|---|---|---|
Impacted products
| Vendor | Product | Version | ||
|---|---|---|---|---|
| Open Mainframe Project | Zowe |
Affected:
2.0.0 , < 2.18.0
(semver)
Affected: 1.0.0 , < 1.28.8 (semver) |
Credits
Pablo Hernan Carle
Pavel Jareš
{
"containers": {
"adp": [
{
"affected": [
{
"cpes": [
"cpe:2.3:a:linuxfoundation:zowe_api_mediation_layer:*:*:*:*:*:*:*:*"
],
"defaultStatus": "unknown",
"product": "zowe_api_mediation_layer",
"vendor": "linuxfoundation",
"versions": [
{
"lessThan": "2.18.0",
"status": "affected",
"version": "2.0.0",
"versionType": "semver"
},
{
"lessThan": "1.28.8",
"status": "affected",
"version": "1.0.0",
"versionType": "semver"
}
]
}
],
"metrics": [
{
"other": {
"content": {
"id": "CVE-2024-9798",
"options": [
{
"Exploitation": "none"
},
{
"Automatable": "no"
},
{
"Technical Impact": "total"
}
],
"role": "CISA Coordinator",
"timestamp": "2024-10-10T14:16:37.423471Z",
"version": "2.0.3"
},
"type": "ssvc"
}
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-312",
"description": "CWE-312 Cleartext Storage of Sensitive Information",
"lang": "en",
"type": "CWE"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2024-10-10T14:21:58.664Z",
"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"shortName": "CISA-ADP"
},
"title": "CISA ADP Vulnrichment"
}
],
"cna": {
"affected": [
{
"product": "Zowe",
"vendor": "Open Mainframe Project",
"versions": [
{
"lessThan": "2.18.0",
"status": "affected",
"version": "2.0.0",
"versionType": "semver"
},
{
"lessThan": "1.28.8",
"status": "affected",
"version": "1.0.0",
"versionType": "semver"
}
]
}
],
"credits": [
{
"lang": "en",
"type": "finder",
"value": "Pablo Hernan Carle"
},
{
"lang": "en",
"type": "finder",
"value": "Pavel Jare\u0161"
}
],
"descriptions": [
{
"lang": "en",
"value": "The health endpoint is public so everybody can see a list of all services. It is potentially valuable information for attackers."
}
],
"exploits": [
{
"lang": "en",
"value": "There are no known exploits of this issue however exploits targeting this issue are publicly available."
}
],
"metrics": [
{
"cvssV3_1": {
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H/E:F/RL:T/RC:C/CR:H/IR:H/AR:M/MAV:N/MAC:L/MPR:N/MUI:N/MS:C/MC:H/MI:H/MA:H",
"version": "3.1"
},
"format": "CVSS",
"scenarios": [
{
"lang": "en",
"value": "GENERAL"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2024-10-10T07:29:10.066Z",
"orgId": "b1336bef-059d-4e13-b11b-9a6ef21b3c78",
"shortName": "Zowe"
},
"references": [
{
"tags": [
"product"
],
"url": "https://github.com/zowe/api-layer"
}
],
"solutions": [
{
"lang": "en",
"value": "In version 2.18.0 set configuration property `apiml.health.protected` to `true` to require authentication or upgrade to version 3."
}
],
"title": "Health endpoint offers list of onboarded services to unauthenticated users",
"workarounds": [
{
"lang": "en",
"value": "No workaround is available."
}
]
}
},
"cveMetadata": {
"assignerOrgId": "b1336bef-059d-4e13-b11b-9a6ef21b3c78",
"assignerShortName": "Zowe",
"cveId": "CVE-2024-9798",
"datePublished": "2024-10-10T07:29:10.066Z",
"dateReserved": "2024-10-10T07:29:09.962Z",
"dateUpdated": "2024-10-10T14:21:58.664Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2024-6916 (GCVE-0-2024-6916)
Vulnerability from cvelistv5 – Published: 2024-07-19 10:47 – Updated: 2024-08-01 21:45
VLAI?
Summary
A vulnerability in Zowe CLI allows local, privileged actors to display securely stored properties in cleartext within a terminal using the '--show-inputs-only' flag.
Severity ?
CWE
Assigner
References
| URL | Tags | |
|---|---|---|
Impacted products
| Vendor | Product | Version | ||
|---|---|---|---|---|
| Open Mainframe Project | Zowe CLI - Imperative |
Affected:
5.1.0 , < 5.22.6
(semver)
|
Credits
Broadcom Inc.
{
"containers": {
"adp": [
{
"metrics": [
{
"other": {
"content": {
"id": "CVE-2024-6916",
"options": [
{
"Exploitation": "none"
},
{
"Automatable": "no"
},
{
"Technical Impact": "partial"
}
],
"role": "CISA Coordinator",
"timestamp": "2024-07-19T14:05:27.251877Z",
"version": "2.0.3"
},
"type": "ssvc"
}
}
],
"providerMetadata": {
"dateUpdated": "2024-07-19T14:05:38.997Z",
"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"shortName": "CISA-ADP"
},
"title": "CISA ADP Vulnrichment"
},
{
"providerMetadata": {
"dateUpdated": "2024-08-01T21:45:38.247Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"tags": [
"product",
"x_transferred"
],
"url": "https://github.com/zowe/zowe-cli/packages/imperative"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "Zowe CLI - Imperative",
"vendor": "Open Mainframe Project",
"versions": [
{
"lessThan": "5.22.6",
"status": "affected",
"version": "5.1.0",
"versionType": "semver"
}
]
}
],
"credits": [
{
"lang": "en",
"type": "reporter",
"value": "Broadcom Inc."
}
],
"descriptions": [
{
"lang": "en",
"value": "A vulnerability in Zowe CLI allows local, privileged actors to display securely stored properties in cleartext within a terminal using the \u0027--show-inputs-only\u0027 flag."
}
],
"exploits": [
{
"lang": "en",
"value": "There are no known exploits of this issue."
}
],
"metrics": [
{
"cvssV3_1": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "NONE",
"baseScore": 5.9,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "CHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:C/C:H/I:N/A:N/E:P/RL:O/RC:C/CR:M/IR:X/AR:X/MAV:L/MAC:L/MPR:L/MUI:R/MS:C/MC:H/MI:N/MA:N",
"version": "3.1"
},
"format": "CVSS",
"scenarios": [
{
"lang": "en",
"value": "GENERAL"
}
]
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "CWE-257: Storing Passwords in a Recoverable Format",
"lang": "en"
}
]
},
{
"descriptions": [
{
"description": "CWE-1295: Debug Messages Revealing Unnecessary Information",
"lang": "en"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2024-07-19T10:47:07.892Z",
"orgId": "b1336bef-059d-4e13-b11b-9a6ef21b3c78",
"shortName": "Zowe"
},
"references": [
{
"tags": [
"product"
],
"url": "https://github.com/zowe/zowe-cli/packages/imperative"
}
],
"solutions": [
{
"lang": "en",
"value": "This issue is fixed in Imperative 5.22.6 or later, included in Zowe CLI \u003e=7.23.8, which is part of Zowe 2.16.0 or later."
}
],
"title": "Zowe CLI --show-inputs-only displays securely stored properties"
}
},
"cveMetadata": {
"assignerOrgId": "b1336bef-059d-4e13-b11b-9a6ef21b3c78",
"assignerShortName": "Zowe",
"cveId": "CVE-2024-6916",
"datePublished": "2024-07-19T10:47:07.892Z",
"dateReserved": "2024-07-19T10:47:07.794Z",
"dateUpdated": "2024-08-01T21:45:38.247Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2024-6834 (GCVE-0-2024-6834)
Vulnerability from cvelistv5 – Published: 2024-07-17 14:44 – Updated: 2024-08-13 21:00
VLAI?
Summary
A vulnerability in APIML Spring Cloud Gateway which leverages user privileges by unexpected signing proxied request by Zowe's client certificate. This allows access to a user to the endpoints requiring an internal client certificate without any credentials. It could lead to managing components in there and allow an attacker to handle the whole communication including user credentials.
Severity ?
CWE
- CWE-250 - Execution with Unnecessary Privileges
Assigner
References
| URL | Tags | |
|---|---|---|
Impacted products
| Vendor | Product | Version | ||
|---|---|---|---|---|
| Open Mainframe Project | Zowe |
Affected:
2.4.0 , < 2.14.0
(semver)
|
Credits
Pavel Jares
Andrej Chmelo
{
"containers": {
"adp": [
{
"affected": [
{
"cpes": [
"cpe:2.3:a:linuxfoundation:zowe_api_mediation_layer:*:*:*:*:*:*:*:*"
],
"defaultStatus": "unknown",
"product": "zowe_api_mediation_layer",
"vendor": "linuxfoundation",
"versions": [
{
"lessThan": "2.14.0",
"status": "affected",
"version": "2.4.0",
"versionType": "semver"
}
]
}
],
"metrics": [
{
"other": {
"content": {
"id": "CVE-2024-6834",
"options": [
{
"Exploitation": "none"
},
{
"Automatable": "no"
},
{
"Technical Impact": "total"
}
],
"role": "CISA Coordinator",
"timestamp": "2024-07-17T15:12:02.406649Z",
"version": "2.0.3"
},
"type": "ssvc"
}
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-250",
"description": "CWE-250 Execution with Unnecessary Privileges",
"lang": "en",
"type": "CWE"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2024-08-13T21:00:07.595Z",
"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"shortName": "CISA-ADP"
},
"title": "CISA ADP Vulnrichment"
},
{
"providerMetadata": {
"dateUpdated": "2024-08-01T21:45:38.340Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"tags": [
"product",
"x_transferred"
],
"url": "https://github.com/zowe/api-layer"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "Zowe",
"vendor": "Open Mainframe Project",
"versions": [
{
"lessThan": "2.14.0",
"status": "affected",
"version": "2.4.0",
"versionType": "semver"
}
]
}
],
"credits": [
{
"lang": "en",
"type": "finder",
"value": "Pavel Jares"
},
{
"lang": "en",
"type": "finder",
"value": "Andrej Chmelo"
}
],
"descriptions": [
{
"lang": "en",
"value": "A vulnerability in APIML Spring Cloud Gateway which leverages user privileges by unexpected signing proxied request by Zowe\u0027s client certificate. This allows access to a user to the endpoints requiring an internal client certificate without any credentials. It could lead to managing components in there and allow an attacker to handle the whole communication including user credentials."
}
],
"exploits": [
{
"lang": "en",
"value": "There are no known exploits of this issue however exploits targeting this issue are publicly available."
}
],
"metrics": [
{
"cvssV3_1": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "NONE",
"baseScore": 9,
"baseSeverity": "CRITICAL",
"confidentialityImpact": "LOW",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H/E:F/RL:T/RC:C/CR:H/IR:H/AR:M/MAV:N/MAC:L/MPR:N/MUI:N/MS:C/MC:H/MI:H/MA:H",
"version": "3.1"
},
"format": "CVSS",
"scenarios": [
{
"lang": "en",
"value": "GENERAL"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2024-07-17T14:44:06.283Z",
"orgId": "b1336bef-059d-4e13-b11b-9a6ef21b3c78",
"shortName": "Zowe"
},
"references": [
{
"tags": [
"product"
],
"url": "https://github.com/zowe/api-layer"
}
],
"solutions": [
{
"lang": "en",
"value": "This issue is fixed in the APIML 2.14.4 (Zowe 2.14) and later. Fixed by https://github.com/zowe/api-layer/pull/3203 and https://github.com/zowe/api-layer/pull/3273"
}
],
"title": "Imperative Local Command Injection allows Activity Masking"
}
},
"cveMetadata": {
"assignerOrgId": "b1336bef-059d-4e13-b11b-9a6ef21b3c78",
"assignerShortName": "Zowe",
"cveId": "CVE-2024-6834",
"datePublished": "2024-07-17T14:44:06.283Z",
"dateReserved": "2024-07-17T14:44:06.201Z",
"dateUpdated": "2024-08-13T21:00:07.595Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2024-6833 (GCVE-0-2024-6833)
Vulnerability from cvelistv5 – Published: 2024-07-17 14:41 – Updated: 2024-08-01 21:45
VLAI?
Summary
A vulnerability in Zowe CLI allows local, privileged actors to store previously entered secure credentials in a plaintext file as part of an auto-init operation.
Severity ?
CWE
Assigner
References
| URL | Tags | |
|---|---|---|
Impacted products
| Vendor | Product | Version | ||
|---|---|---|---|---|
| Open Mainframe Project | Zowe |
Affected:
7.18.0 , < 7.23.5
(semver)
|
Credits
Broadcom Inc.
{
"containers": {
"adp": [
{
"metrics": [
{
"other": {
"content": {
"id": "CVE-2024-6833",
"options": [
{
"Exploitation": "none"
},
{
"Automatable": "no"
},
{
"Technical Impact": "partial"
}
],
"role": "CISA Coordinator",
"timestamp": "2024-07-17T15:25:46.275201Z",
"version": "2.0.3"
},
"type": "ssvc"
}
}
],
"providerMetadata": {
"dateUpdated": "2024-07-17T15:26:04.582Z",
"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"shortName": "CISA-ADP"
},
"title": "CISA ADP Vulnrichment"
},
{
"providerMetadata": {
"dateUpdated": "2024-08-01T21:45:38.354Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"tags": [
"product",
"x_transferred"
],
"url": "https://github.com/zowe/zowe-cli/"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "Zowe",
"vendor": "Open Mainframe Project",
"versions": [
{
"lessThan": "7.23.5",
"status": "affected",
"version": "7.18.0",
"versionType": "semver"
}
]
}
],
"credits": [
{
"lang": "en",
"type": "reporter",
"value": "Broadcom Inc."
}
],
"descriptions": [
{
"lang": "en",
"value": "A vulnerability in Zowe CLI allows local, privileged actors to store previously entered secure credentials in a plaintext file as part of an auto-init operation."
}
],
"exploits": [
{
"lang": "en",
"value": "There are no known exploits of this issue."
}
],
"metrics": [
{
"cvssV3_1": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "NONE",
"baseScore": 5.9,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "CHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:C/C:H/I:N/A:N/E:P/RL:O/RC:C/CR:M/IR:X/AR:X/MAV:L/MAC:L/MPR:L/MUI:R/MS:C/MC:H/MI:N/MA:N",
"version": "3.1"
},
"format": "CVSS",
"scenarios": [
{
"lang": "en",
"value": "GENERAL"
}
]
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "CWE-257: Storing Passwords in a Recoverable Format",
"lang": "en"
}
]
},
{
"descriptions": [
{
"description": "CWE-313: Cleartext Storage in a File or on Disk",
"lang": "en"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2024-07-17T14:41:37.598Z",
"orgId": "b1336bef-059d-4e13-b11b-9a6ef21b3c78",
"shortName": "Zowe"
},
"references": [
{
"tags": [
"product"
],
"url": "https://github.com/zowe/zowe-cli/"
}
],
"solutions": [
{
"lang": "en",
"value": "This issue is fixed in Zowe CLI 7.23.5 or later, included as part of Zowe 2.16.0 or later."
}
],
"title": "Zowe CLI Auto-Init Leaks Credentials Locally"
}
},
"cveMetadata": {
"assignerOrgId": "b1336bef-059d-4e13-b11b-9a6ef21b3c78",
"assignerShortName": "Zowe",
"cveId": "CVE-2024-6833",
"datePublished": "2024-07-17T14:41:37.598Z",
"dateReserved": "2024-07-17T14:41:37.247Z",
"dateUpdated": "2024-08-01T21:45:38.354Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2021-4326 (GCVE-0-2021-4326)
Vulnerability from cvelistv5 – Published: 2023-02-22 15:21 – Updated: 2024-08-03 17:23
VLAI?
Summary
A vulnerability in Imperative framework which allows already-privileged local actors to execute arbitrary shell commands via plugin install/update commands, or maliciously formed environment variables. Impacts Zowe CLI.
Severity ?
CWE
- n/a
Assigner
References
| URL | Tags | |
|---|---|---|
Impacted products
| Vendor | Product | Version | ||
|---|---|---|---|---|
| Open Mainframe Project | Zowe |
Affected:
1.16.0 , < 1.28.2
(semver)
Affected: 2.0.0 , < 2.5.0 (semver) |
Credits
Andrew Harn
SonarCloud
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-03T17:23:10.539Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"tags": [
"product",
"x_transferred"
],
"url": "https://github.com/zowe/imperative/"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "Zowe",
"vendor": "Open Mainframe Project",
"versions": [
{
"lessThan": "1.28.2",
"status": "affected",
"version": "1.16.0",
"versionType": "semver"
},
{
"lessThan": "2.5.0",
"status": "affected",
"version": "2.0.0",
"versionType": "semver"
}
]
}
],
"credits": [
{
"lang": "en",
"type": "finder",
"value": "Andrew Harn"
},
{
"lang": "en",
"type": "tool",
"value": "SonarCloud"
}
],
"descriptions": [
{
"lang": "en",
"value": "A vulnerability in Imperative framework which allows already-privileged local actors to execute arbitrary shell commands via plugin install/update commands, or maliciously formed environment variables. Impacts Zowe CLI."
}
],
"exploits": [
{
"lang": "en",
"value": "There are no known exploits of this issue."
}
],
"metrics": [
{
"cvssV3_1": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "NONE",
"baseScore": 3.3,
"baseSeverity": "LOW",
"confidentialityImpact": "LOW",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N/E:P/RL:U/RC:C/CR:L/IR:X/AR:X/MAV:L/MAC:L/MPR:L/MUI:N/MS:U/MC:L/MI:X/MA:X",
"version": "3.1"
},
"format": "CVSS",
"scenarios": [
{
"lang": "en",
"value": "GENERAL"
}
]
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "n/a",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2023-03-01T05:44:22.188214Z",
"orgId": "b1336bef-059d-4e13-b11b-9a6ef21b3c78",
"shortName": "Zowe"
},
"references": [
{
"tags": [
"product"
],
"url": "https://github.com/zowe/imperative/"
}
],
"solutions": [
{
"lang": "en",
"value": "This issue is fixed in Zowe 1.28.2 or later, and Zowe 2.5.0 or later."
}
],
"title": "Imperative Local Command Injection allows Activity Masking"
}
},
"cveMetadata": {
"assignerOrgId": "b1336bef-059d-4e13-b11b-9a6ef21b3c78",
"assignerShortName": "Zowe",
"cveId": "CVE-2021-4326",
"datePublished": "2023-02-22T15:21:06.657Z",
"dateReserved": "2023-02-22T15:14:11.344Z",
"dateUpdated": "2024-08-03T17:23:10.539Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2021-4314 (GCVE-0-2021-4314)
Vulnerability from cvelistv5 – Published: 2023-01-18 15:23 – Updated: 2025-04-03 19:48
VLAI?
Summary
It is possible to manipulate the JWT token without the knowledge of the JWT secret and authenticate without valid JWT token as any user. This is happening only in the situation when zOSMF doesn’t have the APAR PH12143 applied. This issue affects: 1.16 versions to 1.19. What happens is that the services using the ZAAS client or the API ML API to query will be deceived into believing the information in the JWT token is valid when it isn’t. It’s possible to use this to persuade the southbound service that different user is authenticated.
Severity ?
5.3 (Medium)
CWE
- CWE-269 - Improper Privilege Management
Assigner
References
| URL | Tags | |
|---|---|---|
Impacted products
| Vendor | Product | Version | ||
|---|---|---|---|---|
| Open Mainframe Project | Zowe |
Affected:
1.16.0 , < 1.19.0
(semver)
|
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-03T17:23:10.517Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"tags": [
"product",
"x_transferred"
],
"url": "https://github.com/zowe/api-layer/"
}
],
"title": "CVE Program Container"
},
{
"metrics": [
{
"cvssV3_1": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "LOW",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N",
"version": "3.1"
}
},
{
"other": {
"content": {
"id": "CVE-2021-4314",
"options": [
{
"Exploitation": "none"
},
{
"Automatable": "no"
},
{
"Technical Impact": "partial"
}
],
"role": "CISA Coordinator",
"timestamp": "2025-04-02T16:07:48.197704Z",
"version": "2.0.3"
},
"type": "ssvc"
}
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-269",
"description": "CWE-269 Improper Privilege Management",
"lang": "en",
"type": "CWE"
}
]
},
{
"descriptions": [
{
"cweId": "CWE-287",
"description": "CWE-287 Improper Authentication",
"lang": "en",
"type": "CWE"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2025-04-03T19:48:49.004Z",
"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"shortName": "CISA-ADP"
},
"title": "CISA ADP Vulnrichment"
}
],
"cna": {
"affected": [
{
"product": "Zowe",
"vendor": "Open Mainframe Project",
"versions": [
{
"lessThan": "1.19.0",
"status": "affected",
"version": "1.16.0",
"versionType": "semver"
}
]
}
],
"descriptions": [
{
"lang": "en",
"value": "It is possible to manipulate the JWT token without the knowledge of the JWT secret and authenticate without valid JWT token as any user. This is happening only in the situation when zOSMF doesn\u2019t have the APAR PH12143 applied. This issue affects: 1.16 versions to 1.19. What happens is that the services using the ZAAS client or the API ML API to query will be deceived into believing the information in the JWT token is valid when it isn\u2019t. It\u2019s possible to use this to persuade the southbound service that different user is authenticated."
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-269",
"description": "CWE-269 Improper Privilege Management",
"lang": "en",
"type": "CWE"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2023-01-18T15:23:42.797Z",
"orgId": "b1336bef-059d-4e13-b11b-9a6ef21b3c78",
"shortName": "Zowe"
},
"references": [
{
"tags": [
"product"
],
"url": "https://github.com/zowe/api-layer/"
}
]
}
},
"cveMetadata": {
"assignerOrgId": "b1336bef-059d-4e13-b11b-9a6ef21b3c78",
"assignerShortName": "Zowe",
"cveId": "CVE-2021-4314",
"datePublished": "2023-01-18T15:23:42.797Z",
"dateReserved": "2023-01-18T15:23:09.523Z",
"dateUpdated": "2025-04-03T19:48:49.004Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}