CVE-2024-9802 (GCVE-0-2024-9802)
Vulnerability from cvelistv5 – Published: 2024-10-10 07:41 – Updated: 2024-10-10 14:22
VLAI?
Summary
The conformance validation endpoint is public so everybody can verify the conformance of onboarded services. The response could contain specific information about the service, including available endpoints, and swagger. It could advise about the running version of a service to an attacker. The attacker could also check if a service is running.
Severity ?
CWE
- CWE-312 - Cleartext Storage of Sensitive Information
Assigner
References
| URL | Tags | |
|---|---|---|
Impacted products
| Vendor | Product | Version | ||
|---|---|---|---|---|
| Open Mainframe Project | Zowe |
Affected:
2.11.0 , < 2.17.0
(semver)
|
Credits
Pablo Hernan Carle
Pavel Jareš
{
"containers": {
"adp": [
{
"affected": [
{
"cpes": [
"cpe:2.3:a:linuxfoundation:zowe_api_mediation_layer:*:*:*:*:*:*:*:*"
],
"defaultStatus": "unknown",
"product": "zowe_api_mediation_layer",
"vendor": "linuxfoundation",
"versions": [
{
"lessThan": "2.17.0",
"status": "affected",
"version": "2.11.0",
"versionType": "semver"
}
]
}
],
"metrics": [
{
"other": {
"content": {
"id": "CVE-2024-9802",
"options": [
{
"Exploitation": "none"
},
{
"Automatable": "yes"
},
{
"Technical Impact": "partial"
}
],
"role": "CISA Coordinator",
"timestamp": "2024-10-10T13:45:19.081095Z",
"version": "2.0.3"
},
"type": "ssvc"
}
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-312",
"description": "CWE-312 Cleartext Storage of Sensitive Information",
"lang": "en",
"type": "CWE"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2024-10-10T14:22:43.244Z",
"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"shortName": "CISA-ADP"
},
"title": "CISA ADP Vulnrichment"
}
],
"cna": {
"affected": [
{
"product": "Zowe",
"vendor": "Open Mainframe Project",
"versions": [
{
"lessThan": "2.17.0",
"status": "affected",
"version": "2.11.0",
"versionType": "semver"
}
]
}
],
"credits": [
{
"lang": "en",
"type": "finder",
"value": "Pablo Hernan Carle"
},
{
"lang": "en",
"type": "finder",
"value": "Pavel Jare\u0161"
}
],
"descriptions": [
{
"lang": "en",
"value": "The conformance validation endpoint is public so everybody can verify the conformance of onboarded services. The response could contain specific information about the service, including available endpoints, and swagger. It could advise about the running version of a service to an attacker. The attacker could also check if a service is running."
}
],
"exploits": [
{
"lang": "en",
"value": "There are no known exploits of this issue however exploits targeting this issue are publicly available."
}
],
"metrics": [
{
"cvssV3_1": {
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N/E:U/RL:O/RC:C",
"version": "3.1"
},
"format": "CVSS",
"scenarios": [
{
"lang": "en",
"value": "GENERAL"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2024-10-10T07:41:03.374Z",
"orgId": "b1336bef-059d-4e13-b11b-9a6ef21b3c78",
"shortName": "Zowe"
},
"references": [
{
"tags": [
"product"
],
"url": "https://github.com/zowe/api-layer"
}
],
"solutions": [
{
"lang": "en",
"value": "There is a fix since version 2.17.0, authentication is required for the endpoints."
}
],
"title": "Conformance validation endpoint discloses detail about service to unauthenticated users",
"workarounds": [
{
"lang": "en",
"value": "No workaround is available."
}
]
}
},
"cveMetadata": {
"assignerOrgId": "b1336bef-059d-4e13-b11b-9a6ef21b3c78",
"assignerShortName": "Zowe",
"cveId": "CVE-2024-9802",
"datePublished": "2024-10-10T07:41:03.374Z",
"dateReserved": "2024-10-10T07:41:03.236Z",
"dateUpdated": "2024-10-10T14:22:43.244Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1",
"vulnerability-lookup:meta": {
"fkie_nvd": {
"configurations": "[{\"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:linuxfoundation:zowe_api_mediation_layer:*:*:*:*:*:*:*:*\", \"versionStartIncluding\": \"2.11.0\", \"versionEndExcluding\": \"2.17.0\", \"matchCriteriaId\": \"454F6E4D-504F-4080-95F4-4D0A771C52D3\"}]}]}]",
"descriptions": "[{\"lang\": \"en\", \"value\": \"The conformance validation endpoint is public so everybody can verify the conformance of onboarded services. The response could contain specific information about the service, including available endpoints, and swagger. It could advise about the running version of a service to an attacker. The attacker could also check if a service is running.\"}, {\"lang\": \"es\", \"value\": \"El endpoint de validaci\\u00f3n de conformidad es p\\u00fablico, por lo que todos pueden verificar la conformidad de los servicios incorporados. La respuesta podr\\u00eda contener informaci\\u00f3n espec\\u00edfica sobre el servicio, incluidos los endpoints disponibles y swagger. Podr\\u00eda informar a un atacante sobre la versi\\u00f3n en ejecuci\\u00f3n de un servicio. El atacante tambi\\u00e9n podr\\u00eda verificar si un servicio est\\u00e1 en ejecuci\\u00f3n.\"}]",
"id": "CVE-2024-9802",
"lastModified": "2024-12-19T17:00:21.353",
"metrics": "{\"cvssMetricV31\": [{\"source\": \"zowe-security@lists.openmainframeproject.org\", \"type\": \"Secondary\", \"cvssData\": {\"version\": \"3.1\", \"vectorString\": \"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N\", \"baseScore\": 5.3, \"baseSeverity\": \"MEDIUM\", \"attackVector\": \"NETWORK\", \"attackComplexity\": \"LOW\", \"privilegesRequired\": \"NONE\", \"userInteraction\": \"NONE\", \"scope\": \"UNCHANGED\", \"confidentialityImpact\": \"LOW\", \"integrityImpact\": \"NONE\", \"availabilityImpact\": \"NONE\"}, \"exploitabilityScore\": 3.9, \"impactScore\": 1.4}, {\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"cvssData\": {\"version\": \"3.1\", \"vectorString\": \"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N\", \"baseScore\": 5.3, \"baseSeverity\": \"MEDIUM\", \"attackVector\": \"NETWORK\", \"attackComplexity\": \"LOW\", \"privilegesRequired\": \"NONE\", \"userInteraction\": \"NONE\", \"scope\": \"UNCHANGED\", \"confidentialityImpact\": \"LOW\", \"integrityImpact\": \"NONE\", \"availabilityImpact\": \"NONE\"}, \"exploitabilityScore\": 3.9, \"impactScore\": 1.4}]}",
"published": "2024-10-10T08:15:04.387",
"references": "[{\"url\": \"https://github.com/zowe/api-layer\", \"source\": \"zowe-security@lists.openmainframeproject.org\", \"tags\": [\"Product\"]}]",
"sourceIdentifier": "zowe-security@lists.openmainframeproject.org",
"vulnStatus": "Analyzed",
"weaknesses": "[{\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"description\": [{\"lang\": \"en\", \"value\": \"CWE-312\"}]}, {\"source\": \"134c704f-9b21-4f2e-91b3-4a467353bcc0\", \"type\": \"Secondary\", \"description\": [{\"lang\": \"en\", \"value\": \"CWE-312\"}]}]"
},
"nvd": "{\"cve\":{\"id\":\"CVE-2024-9802\",\"sourceIdentifier\":\"zowe-security@lists.openmainframeproject.org\",\"published\":\"2024-10-10T08:15:04.387\",\"lastModified\":\"2024-12-19T17:00:21.353\",\"vulnStatus\":\"Analyzed\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"The conformance validation endpoint is public so everybody can verify the conformance of onboarded services. The response could contain specific information about the service, including available endpoints, and swagger. It could advise about the running version of a service to an attacker. The attacker could also check if a service is running.\"},{\"lang\":\"es\",\"value\":\"El endpoint de validaci\u00f3n de conformidad es p\u00fablico, por lo que todos pueden verificar la conformidad de los servicios incorporados. La respuesta podr\u00eda contener informaci\u00f3n espec\u00edfica sobre el servicio, incluidos los endpoints disponibles y swagger. Podr\u00eda informar a un atacante sobre la versi\u00f3n en ejecuci\u00f3n de un servicio. El atacante tambi\u00e9n podr\u00eda verificar si un servicio est\u00e1 en ejecuci\u00f3n.\"}],\"metrics\":{\"cvssMetricV31\":[{\"source\":\"zowe-security@lists.openmainframeproject.org\",\"type\":\"Secondary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N\",\"baseScore\":5.3,\"baseSeverity\":\"MEDIUM\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"NONE\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"LOW\",\"integrityImpact\":\"NONE\",\"availabilityImpact\":\"NONE\"},\"exploitabilityScore\":3.9,\"impactScore\":1.4},{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N\",\"baseScore\":5.3,\"baseSeverity\":\"MEDIUM\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"NONE\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"LOW\",\"integrityImpact\":\"NONE\",\"availabilityImpact\":\"NONE\"},\"exploitabilityScore\":3.9,\"impactScore\":1.4}]},\"weaknesses\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-312\"}]},{\"source\":\"134c704f-9b21-4f2e-91b3-4a467353bcc0\",\"type\":\"Secondary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-312\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:linuxfoundation:zowe_api_mediation_layer:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"2.11.0\",\"versionEndExcluding\":\"2.17.0\",\"matchCriteriaId\":\"454F6E4D-504F-4080-95F4-4D0A771C52D3\"}]}]}],\"references\":[{\"url\":\"https://github.com/zowe/api-layer\",\"source\":\"zowe-security@lists.openmainframeproject.org\",\"tags\":[\"Product\"]}]}}",
"vulnrichment": {
"containers": "{\"adp\": [{\"title\": \"CISA ADP Vulnrichment\", \"metrics\": [{\"other\": {\"type\": \"ssvc\", \"content\": {\"id\": \"CVE-2024-9802\", \"role\": \"CISA Coordinator\", \"options\": [{\"Exploitation\": \"none\"}, {\"Automatable\": \"yes\"}, {\"Technical Impact\": \"partial\"}], \"version\": \"2.0.3\", \"timestamp\": \"2024-10-10T13:45:19.081095Z\"}}}], \"affected\": [{\"cpes\": [\"cpe:2.3:a:linuxfoundation:zowe_api_mediation_layer:*:*:*:*:*:*:*:*\"], \"vendor\": \"linuxfoundation\", \"product\": \"zowe_api_mediation_layer\", \"versions\": [{\"status\": \"affected\", \"version\": \"2.11.0\", \"lessThan\": \"2.17.0\", \"versionType\": \"semver\"}], \"defaultStatus\": \"unknown\"}], \"problemTypes\": [{\"descriptions\": [{\"lang\": \"en\", \"type\": \"CWE\", \"cweId\": \"CWE-312\", \"description\": \"CWE-312 Cleartext Storage of Sensitive Information\"}]}], \"providerMetadata\": {\"orgId\": \"134c704f-9b21-4f2e-91b3-4a467353bcc0\", \"shortName\": \"CISA-ADP\", \"dateUpdated\": \"2024-10-10T13:50:58.056Z\"}}], \"cna\": {\"title\": \"Conformance validation endpoint discloses detail about service to unauthenticated users\", \"credits\": [{\"lang\": \"en\", \"type\": \"finder\", \"value\": \"Pablo Hernan Carle\"}, {\"lang\": \"en\", \"type\": \"finder\", \"value\": \"Pavel Jare\\u0161\"}], \"metrics\": [{\"format\": \"CVSS\", \"cvssV3_1\": {\"version\": \"3.1\", \"baseScore\": 5.3, \"baseSeverity\": \"MEDIUM\", \"vectorString\": \"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N/E:U/RL:O/RC:C\"}, \"scenarios\": [{\"lang\": \"en\", \"value\": \"GENERAL\"}]}], \"affected\": [{\"vendor\": \"Open Mainframe Project\", \"product\": \"Zowe\", \"versions\": [{\"status\": \"affected\", \"version\": \"2.11.0\", \"lessThan\": \"2.17.0\", \"versionType\": \"semver\"}]}], \"exploits\": [{\"lang\": \"en\", \"value\": \"There are no known exploits of this issue however exploits targeting this issue are publicly available.\"}], \"solutions\": [{\"lang\": \"en\", \"value\": \"There is a fix since version 2.17.0, authentication is required for the endpoints.\"}], \"references\": [{\"url\": \"https://github.com/zowe/api-layer\", \"tags\": [\"product\"]}], \"workarounds\": [{\"lang\": \"en\", \"value\": \"No workaround is available.\"}], \"descriptions\": [{\"lang\": \"en\", \"value\": \"The conformance validation endpoint is public so everybody can verify the conformance of onboarded services. The response could contain specific information about the service, including available endpoints, and swagger. It could advise about the running version of a service to an attacker. The attacker could also check if a service is running.\"}], \"providerMetadata\": {\"orgId\": \"b1336bef-059d-4e13-b11b-9a6ef21b3c78\", \"shortName\": \"Zowe\", \"dateUpdated\": \"2024-10-10T07:41:03.374Z\"}}}",
"cveMetadata": "{\"cveId\": \"CVE-2024-9802\", \"state\": \"PUBLISHED\", \"dateUpdated\": \"2024-10-10T14:22:43.244Z\", \"dateReserved\": \"2024-10-10T07:41:03.236Z\", \"assignerOrgId\": \"b1336bef-059d-4e13-b11b-9a6ef21b3c78\", \"datePublished\": \"2024-10-10T07:41:03.374Z\", \"assignerShortName\": \"Zowe\"}",
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
}
}
Loading…
Loading…
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.
Loading…
Loading…