{"vulnerability": "cve-2024-6834", "sightings": [{"uuid": "d0ed71ed-10fd-4c5e-a62b-04b3d241b7e0", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-6834", "type": "seen", "source": "https://t.me/cvedetector/1080", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-6834 - Zowe APIML Spring Cloud Gateway Certificate Spoofing Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2024-6834 \nPublished : July 17, 2024, 3:15 p.m. | 37\u00a0minutes ago \nDescription : A vulnerability in APIML Spring Cloud Gateway which leverages user privileges by unexpected signing proxied request by Zowe's client certificate. This allows access to a user to the endpoints requiring an internal client certificate without any credentials. It could lead to managing components in there and allow an attacker to handle the whole communication including user credentials. \nSeverity: 9.0 | CRITICAL \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"17 Jul 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-07-17T18:12:58.000000Z"}]}