-
Notifications
You must be signed in to change notification settings - Fork 474
Commit
This commit does not belong to any branch on this repository, and may belong to a fork outside of the repository.
17028 SEC Fix Livestatus injection via REST-API
Prior to this fix, a REST API endpoint improperly handled escaping of data received through POST requests. This vulnerability allowed users with the `update_and_acknowledge` permission for events to inject arbitrary Livestatus commands via the affected endpoint. **Affected Versions**: * 2.4.0 (beta) * 2.3.0 * 2.2.0 * 2.1.0 (EOL) **Vulnerability Management**: We have rated the issue with a CVSS score of 6.0 (Medium) with the following CVSS vector: `CVSS:4.0/AV:N/AC:L/AT:P/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N`, and assigned `CVE-2024-38865`. Change-Id: I0a275351994e9e2b6de201a8311456cd07d39338
- Loading branch information
1 parent
881bdba
commit df8825b
Showing
2 changed files
with
27 additions
and
2 deletions.
There are no files selected for viewing
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,25 @@ | ||
[//]: # (werk v2) | ||
# Fix Livestatus injection via REST-API | ||
|
||
key | value | ||
---------- | --- | ||
date | 2025-01-13T13:23:46+00:00 | ||
version | 2.5.0b1 | ||
class | security | ||
edition | cre | ||
component | rest-api | ||
level | 1 | ||
compatible | yes | ||
|
||
Prior to this fix, a REST API endpoint improperly handled escaping of data received through POST requests. This vulnerability allowed users with the `update_and_acknowledge` permission for events to inject arbitrary Livestatus commands via the affected endpoint. | ||
|
||
**Affected Versions**: | ||
|
||
* 2.4.0 (beta) | ||
* 2.3.0 | ||
* 2.2.0 | ||
* 2.1.0 (EOL) | ||
|
||
**Vulnerability Management**: | ||
|
||
We have rated the issue with a CVSS score of 6.0 (Medium) with the following CVSS vector: `CVSS:4.0/AV:N/AC:L/AT:P/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N`, and assigned `CVE-2024-38865`. |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters