Логотип exploitDog
bind:CVE-2024-27097
Консоль
Логотип exploitDog

exploitDog

bind:CVE-2024-27097

Количество 2

Количество 2

nvd логотип

CVE-2024-27097

почти 2 года назад

A user endpoint didn't perform filtering on an incoming parameter, which was added directly to the application log. This could lead to an attacker injecting false log entries or corrupt the log file format. This has been fixed in the CKAN versions 2.9.11 and 2.10.4. Users are advised to upgrade. Users unable to upgrade should override the `/user/reset` endpoint to filter the `id` parameter in order to exclude newlines.

CVSS3: 4.3
EPSS: Низкий
github логотип

GHSA-8g38-3m6v-232j

почти 2 года назад

Potential log injection in reset user endpoint in CKAN

CVSS3: 4.3
EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
nvd логотип
CVE-2024-27097

A user endpoint didn't perform filtering on an incoming parameter, which was added directly to the application log. This could lead to an attacker injecting false log entries or corrupt the log file format. This has been fixed in the CKAN versions 2.9.11 and 2.10.4. Users are advised to upgrade. Users unable to upgrade should override the `/user/reset` endpoint to filter the `id` parameter in order to exclude newlines.

CVSS3: 4.3
0%
Низкий
почти 2 года назад
github логотип
GHSA-8g38-3m6v-232j

Potential log injection in reset user endpoint in CKAN

CVSS3: 4.3
0%
Низкий
почти 2 года назад

Уязвимостей на страницу