cve-2024-23823
Vulnerability from cvelistv5
Published
2024-03-14 18:47
Modified
2024-08-01 23:13
Severity ?
EPSS score ?
Summary
CORS settings overly permissive in vantage6
References
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2024-23823", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-07-16T18:18:24.767888Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-07-16T18:18:35.796Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" }, { "providerMetadata": { "dateUpdated": "2024-08-01T23:13:08.222Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "https://github.com/vantage6/vantage6/security/advisories/GHSA-4946-85pr-fvxh", "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://github.com/vantage6/vantage6/security/advisories/GHSA-4946-85pr-fvxh" }, { "name": "https://github.com/vantage6/vantage6/commit/70bb4e1d889230a841eb364d6c03accd7dd01a41", "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://github.com/vantage6/vantage6/commit/70bb4e1d889230a841eb364d6c03accd7dd01a41" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "vantage6", "vendor": "vantage6", "versions": [ { "status": "affected", "version": "\u003c= 4.2.2" } ] } ], "descriptions": [ { "lang": "en", "value": "vantage6 is an open source framework built to enable, manage and deploy privacy enhancing technologies like Federated Learning and Multi-Party Computation. The vantage6 server has no restrictions on CORS settings. It should be possible for people to set the allowed origins of the server. The impact is limited because v6 does not use session cookies. This issue has been addressed in commit `70bb4e1d8` and is expected to ship in subsequent releases. Users are advised to upgrade as soon as a new release is available. There are no known workarounds for this vulnerability." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 4.2, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:N", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-942", "description": "CWE-942: Permissive Cross-domain Policy with Untrusted Domains", "lang": "en", "type": "CWE" } ] }, { "descriptions": [ { "cweId": "CWE-863", "description": "CWE-863: Incorrect Authorization", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-03-14T18:47:50.328Z", "orgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "shortName": "GitHub_M" }, "references": [ { "name": "https://github.com/vantage6/vantage6/security/advisories/GHSA-4946-85pr-fvxh", "tags": [ "x_refsource_CONFIRM" ], "url": "https://github.com/vantage6/vantage6/security/advisories/GHSA-4946-85pr-fvxh" }, { "name": "https://github.com/vantage6/vantage6/commit/70bb4e1d889230a841eb364d6c03accd7dd01a41", "tags": [ "x_refsource_MISC" ], "url": "https://github.com/vantage6/vantage6/commit/70bb4e1d889230a841eb364d6c03accd7dd01a41" } ], "source": { "advisory": "GHSA-4946-85pr-fvxh", "discovery": "UNKNOWN" }, "title": "CORS settings overly permissive in vantage6" } }, "cveMetadata": { "assignerOrgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "assignerShortName": "GitHub_M", "cveId": "CVE-2024-23823", "datePublished": "2024-03-14T18:47:50.328Z", "dateReserved": "2024-01-22T22:23:54.338Z", "dateUpdated": "2024-08-01T23:13:08.222Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1", "meta": { "nvd": "{\"cve\":{\"id\":\"CVE-2024-23823\",\"sourceIdentifier\":\"security-advisories@github.com\",\"published\":\"2024-03-14T19:15:49.560\",\"lastModified\":\"2024-03-14T20:11:36.180\",\"vulnStatus\":\"Awaiting Analysis\",\"descriptions\":[{\"lang\":\"en\",\"value\":\"vantage6 is an open source framework built to enable, manage and deploy privacy enhancing technologies like Federated Learning and Multi-Party Computation. The vantage6 server has no restrictions on CORS settings. It should be possible for people to set the allowed origins of the server. The impact is limited because v6 does not use session cookies. This issue has been addressed in commit `70bb4e1d8` and is expected to ship in subsequent releases. Users are advised to upgrade as soon as a new release is available. There are no known workarounds for this vulnerability.\"},{\"lang\":\"es\",\"value\":\"vantage6 es un framework de c\u00f3digo abierto creado para habilitar, administrar e implementar tecnolog\u00edas que mejoran la privacidad, como el aprendizaje federado y la computaci\u00f3n multipartita. El servidor vantage6 no tiene restricciones en la configuraci\u00f3n de CORS. Deber\u00eda ser posible que las personas establezcan los or\u00edgenes permitidos del servidor. El impacto es limitado porque la versi\u00f3n 6 no utiliza cookies de sesi\u00f3n. Este problema se solucion\u00f3 en el commit \\\"70bb4e1d8\\\" y se espera que se incluya en versiones posteriores. Se recomienda a los usuarios que actualicen tan pronto como est\u00e9 disponible una nueva versi\u00f3n. No se conocen workarounds para esta vulnerabilidad.\"}],\"metrics\":{\"cvssMetricV31\":[{\"source\":\"security-advisories@github.com\",\"type\":\"Secondary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:N\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"HIGH\",\"privilegesRequired\":\"NONE\",\"userInteraction\":\"REQUIRED\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"LOW\",\"integrityImpact\":\"LOW\",\"availabilityImpact\":\"NONE\",\"baseScore\":4.2,\"baseSeverity\":\"MEDIUM\"},\"exploitabilityScore\":1.6,\"impactScore\":2.5}]},\"weaknesses\":[{\"source\":\"security-advisories@github.com\",\"type\":\"Secondary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-863\"},{\"lang\":\"en\",\"value\":\"CWE-942\"}]}],\"references\":[{\"url\":\"https://github.com/vantage6/vantage6/commit/70bb4e1d889230a841eb364d6c03accd7dd01a41\",\"source\":\"security-advisories@github.com\"},{\"url\":\"https://github.com/vantage6/vantage6/security/advisories/GHSA-4946-85pr-fvxh\",\"source\":\"security-advisories@github.com\"}]}}" } }
Loading...
Loading...
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.