Skip to content

Commit

Permalink
Merge pull request #5023 from github/proddata-GHSA-7mgx-gvjw-m3w3
Browse files Browse the repository at this point in the history
  • Loading branch information
advisory-database[bot] authored Nov 20, 2024
2 parents d9adb8b + dc53796 commit bffe20d
Showing 1 changed file with 1 addition and 28 deletions.
Original file line number Diff line number Diff line change
@@ -1,18 +1,14 @@
{
"schema_version": "1.4.0",
"id": "GHSA-7mgx-gvjw-m3w3",
"modified": "2024-09-13T18:28:16Z",
"modified": "2024-09-13T18:28:18Z",
"published": "2024-01-30T03:30:30Z",
"aliases": [
"CVE-2023-51982"
],
"summary": "CrateDB authentication bypass vulnerability",
"details": "CrateDB 5.5.1 is contains an authentication bypass vulnerability in the Admin UI component. After configuring password authentication and_ Local_ In the case of an address, identity authentication can be bypassed by setting the X-Real IP request header to a specific value and accessing the Admin UI directly using the default user identity.",
"severity": [
{
"type": "CVSS_V3",
"score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N"
},
{
"type": "CVSS_V4",
"score": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N"
Expand Down Expand Up @@ -94,25 +90,6 @@
]
}
]
},
{
"package": {
"ecosystem": "PyPI",
"name": "crate"
},
"ranges": [
{
"type": "ECOSYSTEM",
"events": [
{
"introduced": "0"
},
{
"last_affected": "0.35.2"
}
]
}
]
}
],
"references": [
Expand All @@ -128,10 +105,6 @@
"type": "WEB",
"url": "https://github.com/crate/crate/pull/15234"
},
{
"type": "WEB",
"url": "https://github.com/crate/crate-python/commit/813946b9420d45877ef7c369311dbc8804d6674f"
},
{
"type": "WEB",
"url": "https://github.com/crate/crate/commit/0c166ef083bec4d64dd55c1d8cb9b3dec350d241"
Expand Down

0 comments on commit bffe20d

Please sign in to comment.