CVE-2024-6915 (GCVE-0-2024-6915)
Vulnerability from cvelistv5 – Published: 2024-08-05 19:34 – Updated: 2024-08-06 14:01
VLAI?
Title
JFrog Artifactory Cache Poisoning
Summary
JFrog Artifactory versions below 7.90.6, 7.84.20, 7.77.14, 7.71.23, 7.68.22, 7.63.22, 7.59.23, 7.55.18 are vulnerable to Improper Input Validation that could potentially lead to cache poisoning.
Severity ?
9.3 (Critical)
CWE
- CWE-20 - Improper Input Validation
Assigner
References
Impacted products
| Vendor | Product | Version | ||
|---|---|---|---|---|
| JFrog | Artifactory |
Affected:
0 , < 7.90.6
(custom)
Affected: 0 , < 7.84.20 (custom) Affected: 0 , < 7.77.14 (custom) Affected: 0 , < 7.71.23 (custom) Affected: 0 , < 7.68.22 (custom) Affected: 0 , < 7.63.22 (custom) Affected: 0 , < 7.59.23 (custom) Affected: 0 , < 7.55.18 (custom) |
Credits
Michael Stepankin (artsploit) from GitHub Security Lab
{
"containers": {
"adp": [
{
"affected": [
{
"cpes": [
"cpe:2.3:a:jfrog:artifactory:*:*:*:*:*:-:*:*"
],
"defaultStatus": "unknown",
"product": "artifactory",
"vendor": "jfrog",
"versions": [
{
"lessThanOrEqual": "7.90.6",
"status": "affected",
"version": "0",
"versionType": "custom"
},
{
"lessThan": "7.84.20",
"status": "affected",
"version": "0",
"versionType": "custom"
},
{
"lessThan": "7.77.14",
"status": "affected",
"version": "0",
"versionType": "custom"
},
{
"lessThan": "7.71.23",
"status": "affected",
"version": "0",
"versionType": "custom"
},
{
"lessThan": "7.68.22",
"status": "affected",
"version": "0",
"versionType": "custom"
},
{
"lessThan": "7.63.22",
"status": "affected",
"version": "0",
"versionType": "custom"
},
{
"lessThan": "7.59.23",
"status": "affected",
"version": "0",
"versionType": "custom"
},
{
"lessThan": "7.55.18",
"status": "affected",
"version": "0",
"versionType": "custom"
}
]
}
],
"metrics": [
{
"other": {
"content": {
"id": "CVE-2024-6915",
"options": [
{
"Exploitation": "none"
},
{
"Automatable": "yes"
},
{
"Technical Impact": "partial"
}
],
"role": "CISA Coordinator",
"timestamp": "2024-08-06T13:54:56.350517Z",
"version": "2.0.3"
},
"type": "ssvc"
}
}
],
"providerMetadata": {
"dateUpdated": "2024-08-06T14:01:18.510Z",
"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"shortName": "CISA-ADP"
},
"title": "CISA ADP Vulnrichment"
}
],
"cna": {
"affected": [
{
"defaultStatus": "unaffected",
"product": "Artifactory",
"vendor": "JFrog",
"versions": [
{
"lessThan": "7.90.6",
"status": "affected",
"version": "0",
"versionType": "custom"
},
{
"lessThan": "7.84.20",
"status": "affected",
"version": "0",
"versionType": "custom"
},
{
"lessThan": "7.77.14",
"status": "affected",
"version": "0",
"versionType": "custom"
},
{
"lessThan": "7.71.23",
"status": "affected",
"version": "0",
"versionType": "custom"
},
{
"lessThan": "7.68.22",
"status": "affected",
"version": "0",
"versionType": "custom"
},
{
"lessThan": "7.63.22",
"status": "affected",
"version": "0",
"versionType": "custom"
},
{
"lessThan": "7.59.23",
"status": "affected",
"version": "0",
"versionType": "custom"
},
{
"lessThan": "7.55.18",
"status": "affected",
"version": "0",
"versionType": "custom"
}
]
}
],
"credits": [
{
"lang": "en",
"type": "reporter",
"value": "Michael Stepankin (artsploit) from GitHub Security Lab"
}
],
"datePublic": "2024-08-05T18:24:00.000Z",
"descriptions": [
{
"lang": "en",
"supportingMedia": [
{
"base64": false,
"type": "text/html",
"value": "\u003cp\u003eJFrog Artifactory versions below 7.90.6, 7.84.20, 7.77.14, 7.71.23, 7.68.22, 7.63.22, 7.59.23, 7.55.18 are vulnerable to Improper Input Validation that could potentially lead to cache poisoning.\u003c/p\u003e"
}
],
"value": "JFrog Artifactory versions below 7.90.6, 7.84.20, 7.77.14, 7.71.23, 7.68.22, 7.63.22, 7.59.23, 7.55.18 are vulnerable to Improper Input Validation that could potentially lead to cache poisoning."
}
],
"impacts": [
{
"capecId": "CAPEC-141",
"descriptions": [
{
"lang": "en",
"value": "CAPEC-141 Cache Poisoning"
}
]
}
],
"metrics": [
{
"cvssV3_1": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "LOW",
"baseScore": 9.3,
"baseSeverity": "CRITICAL",
"confidentialityImpact": "NONE",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "CHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:H/A:L",
"version": "3.1"
},
"format": "CVSS",
"scenarios": [
{
"lang": "en",
"value": "GENERAL"
}
]
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-20",
"description": "CWE-20 Improper Input Validation",
"lang": "en",
"type": "CWE"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2024-08-05T19:34:31.571Z",
"orgId": "48a46f29-ae42-4e1d-90dd-c1676c1e5e6d",
"shortName": "JFROG"
},
"references": [
{
"url": "https://jfrog.com/help/r/jfrog-release-information/jfrog-security-advisories"
}
],
"source": {
"discovery": "EXTERNAL"
},
"title": "JFrog Artifactory Cache Poisoning",
"x_generator": {
"engine": "Vulnogram 0.2.0"
}
}
},
"cveMetadata": {
"assignerOrgId": "48a46f29-ae42-4e1d-90dd-c1676c1e5e6d",
"assignerShortName": "JFROG",
"cveId": "CVE-2024-6915",
"datePublished": "2024-08-05T19:34:31.571Z",
"dateReserved": "2024-07-19T10:25:52.696Z",
"dateUpdated": "2024-08-06T14:01:18.510Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1",
"vulnerability-lookup:meta": {
"fkie_nvd": {
"descriptions": "[{\"lang\": \"en\", \"value\": \"JFrog Artifactory versions below 7.90.6, 7.84.20, 7.77.14, 7.71.23, 7.68.22, 7.63.22, 7.59.23, 7.55.18 are vulnerable to Improper Input Validation that could potentially lead to cache poisoning.\"}, {\"lang\": \"es\", \"value\": \"Las versiones de JFrog Artifactory inferiores a 7.90.6, 7.84.20, 7.77.14, 7.71.23, 7.68.22, 7.63.22, 7.59.23, 7.55.18 son vulnerables a una validaci\\u00f3n de entrada incorrecta que podr\\u00eda provocar un envenenamiento de la cach\\u00e9.\"}]",
"id": "CVE-2024-6915",
"lastModified": "2024-08-06T16:30:24.547",
"metrics": "{\"cvssMetricV31\": [{\"source\": \"reefs@jfrog.com\", \"type\": \"Secondary\", \"cvssData\": {\"version\": \"3.1\", \"vectorString\": \"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:H/A:L\", \"baseScore\": 9.3, \"baseSeverity\": \"CRITICAL\", \"attackVector\": \"NETWORK\", \"attackComplexity\": \"LOW\", \"privilegesRequired\": \"NONE\", \"userInteraction\": \"NONE\", \"scope\": \"CHANGED\", \"confidentialityImpact\": \"NONE\", \"integrityImpact\": \"HIGH\", \"availabilityImpact\": \"LOW\"}, \"exploitabilityScore\": 3.9, \"impactScore\": 4.7}]}",
"published": "2024-08-05T20:15:36.927",
"references": "[{\"url\": \"https://jfrog.com/help/r/jfrog-release-information/jfrog-security-advisories\", \"source\": \"reefs@jfrog.com\"}]",
"sourceIdentifier": "reefs@jfrog.com",
"vulnStatus": "Awaiting Analysis",
"weaknesses": "[{\"source\": \"reefs@jfrog.com\", \"type\": \"Secondary\", \"description\": [{\"lang\": \"en\", \"value\": \"CWE-20\"}]}]"
},
"nvd": "{\"cve\":{\"id\":\"CVE-2024-6915\",\"sourceIdentifier\":\"reefs@jfrog.com\",\"published\":\"2024-08-05T20:15:36.927\",\"lastModified\":\"2024-08-06T16:30:24.547\",\"vulnStatus\":\"Awaiting Analysis\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"JFrog Artifactory versions below 7.90.6, 7.84.20, 7.77.14, 7.71.23, 7.68.22, 7.63.22, 7.59.23, 7.55.18 are vulnerable to Improper Input Validation that could potentially lead to cache poisoning.\"},{\"lang\":\"es\",\"value\":\"Las versiones de JFrog Artifactory inferiores a 7.90.6, 7.84.20, 7.77.14, 7.71.23, 7.68.22, 7.63.22, 7.59.23, 7.55.18 son vulnerables a una validaci\u00f3n de entrada incorrecta que podr\u00eda provocar un envenenamiento de la cach\u00e9.\"}],\"metrics\":{\"cvssMetricV31\":[{\"source\":\"reefs@jfrog.com\",\"type\":\"Secondary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:H/A:L\",\"baseScore\":9.3,\"baseSeverity\":\"CRITICAL\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"NONE\",\"userInteraction\":\"NONE\",\"scope\":\"CHANGED\",\"confidentialityImpact\":\"NONE\",\"integrityImpact\":\"HIGH\",\"availabilityImpact\":\"LOW\"},\"exploitabilityScore\":3.9,\"impactScore\":4.7}]},\"weaknesses\":[{\"source\":\"reefs@jfrog.com\",\"type\":\"Secondary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-20\"}]}],\"references\":[{\"url\":\"https://jfrog.com/help/r/jfrog-release-information/jfrog-security-advisories\",\"source\":\"reefs@jfrog.com\"}]}}",
"vulnrichment": {
"containers": "{\"adp\": [{\"title\": \"CISA ADP Vulnrichment\", \"metrics\": [{\"other\": {\"type\": \"ssvc\", \"content\": {\"id\": \"CVE-2024-6915\", \"role\": \"CISA Coordinator\", \"options\": [{\"Exploitation\": \"none\"}, {\"Automatable\": \"yes\"}, {\"Technical Impact\": \"partial\"}], \"version\": \"2.0.3\", \"timestamp\": \"2024-08-06T13:54:56.350517Z\"}}}], \"affected\": [{\"cpes\": [\"cpe:2.3:a:jfrog:artifactory:*:*:*:*:*:-:*:*\"], \"vendor\": \"jfrog\", \"product\": \"artifactory\", \"versions\": [{\"status\": \"affected\", \"version\": \"0\", \"versionType\": \"custom\", \"lessThanOrEqual\": \"7.90.6\"}, {\"status\": \"affected\", \"version\": \"0\", \"lessThan\": \"7.84.20\", \"versionType\": \"custom\"}, {\"status\": \"affected\", \"version\": \"0\", \"lessThan\": \"7.77.14\", \"versionType\": \"custom\"}, {\"status\": \"affected\", \"version\": \"0\", \"lessThan\": \"7.71.23\", \"versionType\": \"custom\"}, {\"status\": \"affected\", \"version\": \"0\", \"lessThan\": \"7.68.22\", \"versionType\": \"custom\"}, {\"status\": \"affected\", \"version\": \"0\", \"lessThan\": \"7.63.22\", \"versionType\": \"custom\"}, {\"status\": \"affected\", \"version\": \"0\", \"lessThan\": \"7.59.23\", \"versionType\": \"custom\"}, {\"status\": \"affected\", \"version\": \"0\", \"lessThan\": \"7.55.18\", \"versionType\": \"custom\"}], \"defaultStatus\": \"unknown\"}], \"providerMetadata\": {\"orgId\": \"134c704f-9b21-4f2e-91b3-4a467353bcc0\", \"shortName\": \"CISA-ADP\", \"dateUpdated\": \"2024-08-06T13:56:31.079Z\"}}], \"cna\": {\"title\": \"JFrog Artifactory Cache Poisoning\", \"source\": {\"discovery\": \"EXTERNAL\"}, \"credits\": [{\"lang\": \"en\", \"type\": \"reporter\", \"value\": \"Michael Stepankin (artsploit) from GitHub Security Lab\"}], \"impacts\": [{\"capecId\": \"CAPEC-141\", \"descriptions\": [{\"lang\": \"en\", \"value\": \"CAPEC-141 Cache Poisoning\"}]}], \"metrics\": [{\"format\": \"CVSS\", \"cvssV3_1\": {\"scope\": \"CHANGED\", \"version\": \"3.1\", \"baseScore\": 9.3, \"attackVector\": \"NETWORK\", \"baseSeverity\": \"CRITICAL\", \"vectorString\": \"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:H/A:L\", \"integrityImpact\": \"HIGH\", \"userInteraction\": \"NONE\", \"attackComplexity\": \"LOW\", \"availabilityImpact\": \"LOW\", \"privilegesRequired\": \"NONE\", \"confidentialityImpact\": \"NONE\"}, \"scenarios\": [{\"lang\": \"en\", \"value\": \"GENERAL\"}]}], \"affected\": [{\"vendor\": \"JFrog\", \"product\": \"Artifactory\", \"versions\": [{\"status\": \"affected\", \"version\": \"0\", \"lessThan\": \"7.90.6\", \"versionType\": \"custom\"}, {\"status\": \"affected\", \"version\": \"0\", \"lessThan\": \"7.84.20\", \"versionType\": \"custom\"}, {\"status\": \"affected\", \"version\": \"0\", \"lessThan\": \"7.77.14\", \"versionType\": \"custom\"}, {\"status\": \"affected\", \"version\": \"0\", \"lessThan\": \"7.71.23\", \"versionType\": \"custom\"}, {\"status\": \"affected\", \"version\": \"0\", \"lessThan\": \"7.68.22\", \"versionType\": \"custom\"}, {\"status\": \"affected\", \"version\": \"0\", \"lessThan\": \"7.63.22\", \"versionType\": \"custom\"}, {\"status\": \"affected\", \"version\": \"0\", \"lessThan\": \"7.59.23\", \"versionType\": \"custom\"}, {\"status\": \"affected\", \"version\": \"0\", \"lessThan\": \"7.55.18\", \"versionType\": \"custom\"}], \"defaultStatus\": \"unaffected\"}], \"datePublic\": \"2024-08-05T18:24:00.000Z\", \"references\": [{\"url\": \"https://jfrog.com/help/r/jfrog-release-information/jfrog-security-advisories\"}], \"x_generator\": {\"engine\": \"Vulnogram 0.2.0\"}, \"descriptions\": [{\"lang\": \"en\", \"value\": \"JFrog Artifactory versions below 7.90.6, 7.84.20, 7.77.14, 7.71.23, 7.68.22, 7.63.22, 7.59.23, 7.55.18 are vulnerable to Improper Input Validation that could potentially lead to cache poisoning.\", \"supportingMedia\": [{\"type\": \"text/html\", \"value\": \"\u003cp\u003eJFrog Artifactory versions below 7.90.6, 7.84.20, 7.77.14, 7.71.23, 7.68.22, 7.63.22, 7.59.23, 7.55.18 are vulnerable to Improper Input Validation that could potentially lead to cache poisoning.\u003c/p\u003e\", \"base64\": false}]}], \"problemTypes\": [{\"descriptions\": [{\"lang\": \"en\", \"type\": \"CWE\", \"cweId\": \"CWE-20\", \"description\": \"CWE-20 Improper Input Validation\"}]}], \"providerMetadata\": {\"orgId\": \"48a46f29-ae42-4e1d-90dd-c1676c1e5e6d\", \"shortName\": \"JFROG\", \"dateUpdated\": \"2024-08-05T19:34:31.571Z\"}}}",
"cveMetadata": "{\"cveId\": \"CVE-2024-6915\", \"state\": \"PUBLISHED\", \"dateUpdated\": \"2024-08-06T14:01:18.510Z\", \"dateReserved\": \"2024-07-19T10:25:52.696Z\", \"assignerOrgId\": \"48a46f29-ae42-4e1d-90dd-c1676c1e5e6d\", \"datePublished\": \"2024-08-05T19:34:31.571Z\", \"assignerShortName\": \"JFROG\"}",
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
}
}
Loading…
Loading…
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.
Loading…
Loading…