Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-8g38-3m6v-232j

Опубликовано: 13 мар. 2024
Источник: github
Github: Прошло ревью
CVSS3: 4.3

Описание

Potential log injection in reset user endpoint in CKAN

A user endpoint didn't perform filtering on an incoming parameter, which was added directly to the application log. This could lead to an attacker injecting false log entries or corrupt the log file format.

Patches

This has been fixed in the CKAN 2.9.11 and 2.10.4 versions

Workarounds

Override the /user/reset endpoint to filter the id parameter in order to exclude newlines

Пакеты

Наименование

ckan

pip
Затронутые версииВерсия исправления

< 2.9.11

2.9.11

Наименование

ckan

pip
Затронутые версииВерсия исправления

>= 2.10.0, < 2.10.4

2.10.4

EPSS

Процентиль: 56%
0.00341
Низкий

4.3 Medium

CVSS3

Дефекты

CWE-117
CWE-532

Связанные уязвимости

CVSS3: 4.3
nvd
почти 2 года назад

A user endpoint didn't perform filtering on an incoming parameter, which was added directly to the application log. This could lead to an attacker injecting false log entries or corrupt the log file format. This has been fixed in the CKAN versions 2.9.11 and 2.10.4. Users are advised to upgrade. Users unable to upgrade should override the `/user/reset` endpoint to filter the `id` parameter in order to exclude newlines.

EPSS

Процентиль: 56%
0.00341
Низкий

4.3 Medium

CVSS3

Дефекты

CWE-117
CWE-532