Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2024-8260

Опубликовано: 30 авг. 2024
Источник: redhat
CVSS3: 6.1
EPSS Низкий

Описание

A SMB force-authentication vulnerability exists in all versions of OPA for Windows prior to v0.68.0. The vulnerability exists because of improper input validation, allowing a user to pass an arbitrary SMB share instead of a Rego file as an argument to OPA CLI or to one of the OPA Go library’s functions.

An SMB force-authentication vulnerability exists in all versions of OPA. The vulnerability exists due to improper input validation, allowing a user to pass an arbitrary SMB share instead of a Rego file as an argument to OPA CLI or one of the OPA Go library’s functions.

Отчет

The SMB force-authentication vulnerability in OPA for Windows builds is classified as moderate severity due to its specific exploitation requirements and potential impact. The flaw arises from improper input validation, allowing an attacker to supply an arbitrary SMB share instead of a Rego file. However, exploitation of this issue necessitates direct access to the OPA CLI or its Go library functions, and the attacker must have the ability to influence the arguments passed to these components. While it could lead to unauthorized access or manipulation of data if exploited, the attack vector is limited and requires specific conditions to be met.

Меры по смягчению последствий

Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.

Затронутые пакеты

ПлатформаПакетСостояниеРекомендацияРелиз
Logging Subsystem for Red Hat OpenShiftopenshift-logging/lokistack-gateway-rhel9Not affected
Logging Subsystem for Red Hat OpenShiftopenshift-logging/opa-openshift-rhel8Not affected
Migration Toolkit for Virtualizationmigration-toolkit-virtualization/mtv-validation-rhel9Affected
Red Hat Connectivity Link 1authorino-containerAffected
Red Hat OpenShift distributed tracing 3rhosdt/tempo-gateway-opa-rhel8Affected
Red Hat OpenShift distributed tracing 3.4registry.redhat.io/rhosdt/tempo-gateway-opa-rhel8FixedRHSA-2024:1094811.12.2024

Показывать по

Дополнительная информация

Статус:

Moderate
Дефект:
CWE-294

EPSS

Процентиль: 27%
0.00096
Низкий

6.1 Medium

CVSS3

Связанные уязвимости

CVSS3: 6.1
nvd
больше 1 года назад

A SMB force-authentication vulnerability exists in all versions of OPA for Windows prior to v0.68.0. The vulnerability exists because of improper input validation, allowing a user to pass an arbitrary SMB share instead of a Rego file as an argument to OPA CLI or to one of the OPA Go library’s functions.

CVSS3: 6.1
github
больше 1 года назад

OPA for Windows has an SMB force-authentication vulnerability

EPSS

Процентиль: 27%
0.00096
Низкий

6.1 Medium

CVSS3