Products
APIML Spring Cloud Gateway
Source
zowe-security@lists.openmainframeproject.org
Tags
CVE-2024-6834 details
Published : July 17, 2024, 3:15 p.m.
Last Modified : July 17, 2024, 3:15 p.m.
Last Modified : July 17, 2024, 3:15 p.m.
Description
A vulnerability in APIML Spring Cloud Gateway which leverages user privileges by unexpected signing proxied request by Zowe's client certificate. This allows access to a user to the endpoints requiring an internal client certificate without any credentials. It could lead to managing components in there and allow an attacker to handle the whole communication including user credentials.
CVSS Score
1 | 2 | 3 | 4 | 5 | 6 | 7 | 8 | 9.0 | 10 |
---|
Weakness
Weakness | Name | Description |
---|
CVSS Data
Attack Vector
NETWORK
Attack Complexity
HIGH
Privileges Required
NONE
Scope
CHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
Base Score
9.0
Exploitability Score
2.2
Impact Score
6.0
Base Severity
CRITICAL
Vector String : CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H
References
URL | Source |
---|---|
https://github.com/zowe/api-layer | zowe-security@lists.openmainframeproject.org |
This website uses the NVD API, but is not approved or certified by it.