FKIE_CVE-2024-10649

Vulnerability from fkie_nvd - Published: 2025-02-10 19:15 - Updated: 2025-02-11 00:15
Summary
wandb/openui latest commit c945bb859979659add5f490a874140ad17c56a5d contains a vulnerability where unauthenticated endpoints allow file uploads and downloads from an AWS S3 bucket. This can lead to multiple security issues including denial of service, stored XSS, and information disclosure. The affected endpoints are '/v1/share/{id:str}' for uploading and '/v1/share/{id:str}' for downloading JSON files. The lack of authentication allows any user to upload and overwrite files, potentially causing the S3 bucket to run out of space, injecting malicious scripts, and accessing sensitive information.
Impacted products
Vendor Product Version

{
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "wandb/openui latest commit c945bb859979659add5f490a874140ad17c56a5d contains a vulnerability where unauthenticated endpoints allow file uploads and downloads from an AWS S3 bucket. This can lead to multiple security issues including denial of service, stored XSS, and information disclosure. The affected endpoints are \u0027/v1/share/{id:str}\u0027 for uploading and \u0027/v1/share/{id:str}\u0027 for downloading JSON files. The lack of authentication allows any user to upload and overwrite files, potentially causing the S3 bucket to run out of space, injecting malicious scripts, and accessing sensitive information."
    },
    {
      "lang": "es",
      "value": "El ultimo commit c945bb859979659add5f490a874140ad17c56a5d de wandb/openui contiene una vulnerabilidad en la que los endpoints no autenticados permiten la carga y descarga de archivos desde un dep\u00f3sito S3 de AWS. Esto puede provocar m\u00faltiples problemas de seguridad, como denegaci\u00f3n de servicio, XSS almacenado y divulgaci\u00f3n de informaci\u00f3n. Los endpoints afectados son \u0027/v1/share/{id:str}\u0027 para la carga y \u0027/v1/share/{id:str}\u0027 para la descarga de archivos JSON. La falta de autenticaci\u00f3n permite que cualquier usuario cargue y sobrescriba archivos, lo que puede provocar que el dep\u00f3sito S3 se quede sin espacio, inyecte scripts maliciosos y acceda a informaci\u00f3n confidencial."
    }
  ],
  "id": "CVE-2024-10649",
  "lastModified": "2025-02-11T00:15:27.680",
  "metrics": {
    "cvssMetricV30": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "NETWORK",
          "availabilityImpact": "NONE",
          "baseScore": 6.1,
          "baseSeverity": "MEDIUM",
          "confidentialityImpact": "LOW",
          "integrityImpact": "LOW",
          "privilegesRequired": "NONE",
          "scope": "CHANGED",
          "userInteraction": "REQUIRED",
          "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
          "version": "3.0"
        },
        "exploitabilityScore": 2.8,
        "impactScore": 2.7,
        "source": "security@huntr.dev",
        "type": "Secondary"
      }
    ]
  },
  "published": "2025-02-10T19:15:37.117",
  "references": [
    {
      "source": "security@huntr.dev",
      "url": "https://huntr.com/bounties/1025793a-3c19-4148-a26e-80cd84d4822d"
    },
    {
      "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
      "url": "https://huntr.com/bounties/1025793a-3c19-4148-a26e-80cd84d4822d"
    }
  ],
  "sourceIdentifier": "security@huntr.dev",
  "vulnStatus": "Awaiting Analysis",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-306"
        }
      ],
      "source": "security@huntr.dev",
      "type": "Secondary"
    }
  ]
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or observed by the user.
  • Confirmed: The vulnerability has been validated from an analyst's perspective.
  • Published Proof of Concept: A public proof of concept is available for this vulnerability.
  • Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
  • Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
  • Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
  • Not confirmed: The user expressed doubt about the validity of the vulnerability.
  • Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.


Loading…

Detection rules are retrieved from Rulezet.

Loading…

Loading…