Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-m8v7-469p-5x89

Опубликовано: 25 июл. 2023
Источник: github
Github: Прошло ревью
CVSS3: 5.3

Описание

Hard-coded System User Credentials in Folio Data Export Spring module

Impact

The module creates a system user that is used to perform internal module-to-module operations. Credentials for this user are hard-coded in the source code. This makes it trivial to authenticate as this user, allowing unauthorized read access to these mod-inventory-storage records: instances, holdings, items, contributor-types, identifier-types. This includes records marked as suppressed from discovery.

Patches

Upgrade mod-remote-storage to >=2.0.3, or a 1.7.x version >=1.7.1.

Workarounds

No known workarounds.

References

https://wiki.folio.org/x/hbMMBw - FOLIO Security Advisory with Upgrade Instructions https://github.com/folio-org/mod-remote-storage/commit/57df495f76e9aa5be9ce7ce3a65f89b6dbcbc13b - Fix

Пакеты

Наименование

org.folio:mod-remote-storage

maven
Затронутые версииВерсия исправления

>= 2.0.0, < 2.0.3

2.0.3

Наименование

org.folio:mod-remote-storage

maven
Затронутые версииВерсия исправления

< 1.7.2

1.7.2

EPSS

Процентиль: 59%
0.00389
Низкий

5.3 Medium

CVSS3

Дефекты

CWE-798

Связанные уязвимости

CVSS3: 5.3
nvd
около 2 лет назад

Hard-coded credentials in mod-remote-storage versions under 1.7.2 and from 2.0.0 to 2.0.3 allows unauthorized users to gain read access to mod-inventory-storage records including instances, holdings, items, contributor-types, and identifier-types.

EPSS

Процентиль: 59%
0.00389
Низкий

5.3 Medium

CVSS3

Дефекты

CWE-798