Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-583g-g682-crxf

Опубликовано: 09 фев. 2024
Источник: github
Github: Прошло ревью
CVSS3: 5.1

Описание

Micronaut management endpoints vulnerable to drive-by localhost attack

Summary

Enabled but unsecured management endpoints are susceptible to drive-by localhost attacks. While not typical of a production application, these attacks may have more impact on a development environment where such endpoints may be flipped on without much thought.

Details

A malicious/compromised website can make HTTP requests to localhost. Normally, such requests would trigger a CORS preflight check which would prevent the request; however, some requests are "simple" and do not require a preflight check. These endpoints, if enabled and not secured, are vulnerable to being triggered.

Impact

Production environments typically disable unused endpoints and secure/restrict access to needed endpoints. A more likely victim is the developer in their local development host, who has enabled endpoints without security for the sake of easing development.

Пакеты

Наименование

io.micronaut:micronaut-http-server

maven
Затронутые версииВерсия исправления

< 3.8.3

3.8.3

Наименование

io.micronaut:micronaut-http-server-netty

maven
Затронутые версииВерсия исправления

< 3.8.3

3.8.3

Наименование

io.micronaut:micronaut-http-server-tck

maven
Затронутые версииВерсия исправления

< 3.8.3

3.8.3

EPSS

Процентиль: 4%
0.00018
Низкий

5.1 Medium

CVSS3

Дефекты

CWE-15
CWE-610
CWE-664

Связанные уязвимости

CVSS3: 5.1
nvd
почти 2 года назад

Micronaut Framework is a modern, JVM-based, full stack Java framework designed for building modular, easily testable JVM applications with support for Java, Kotlin and the Groovy language. Enabled but unsecured management endpoints are susceptible to drive-by localhost attacks. While not typical of a production application, these attacks may have more impact on a development environment where such endpoints may be flipped on without much thought. A malicious/compromised website can make HTTP requests to `localhost`. Normally, such requests would trigger a CORS preflight check which would prevent the request; however, some requests are "simple" and do not require a preflight check. These endpoints, if enabled and not secured, are vulnerable to being triggered. Production environments typically disable unused endpoints and secure/restrict access to needed endpoints. A more likely victim is the developer in their local development host, who has enabled endpoints without security for the s

EPSS

Процентиль: 4%
0.00018
Низкий

5.1 Medium

CVSS3

Дефекты

CWE-15
CWE-610
CWE-664