Show plain JSON{"id": "CVE-2024-27916", "metrics": {"cvssMetricV31": [{"type": "Secondary", "source": "security-advisories@github.com", "cvssData": {"scope": "UNCHANGED", "version": "3.1", "baseScore": 7.1, "attackVector": "NETWORK", "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:H/A:N", "integrityImpact": "HIGH", "userInteraction": "NONE", "attackComplexity": "LOW", "availabilityImpact": "NONE", "privilegesRequired": "LOW", "confidentialityImpact": "LOW"}, "impactScore": 4.2, "exploitabilityScore": 2.8}]}, "published": "2024-03-21T02:52:20.617", "references": [{"url": "https://github.com/stacklok/minder/blob/a115c8524fbd582b2b277eaadce024bebbded508/internal/controlplane/handlers_repositories.go#L277-L278", "source": "security-advisories@github.com"}, {"url": "https://github.com/stacklok/minder/blob/main/internal/controlplane/handlers_repositories.go#L257-L299", "source": "security-advisories@github.com"}, {"url": "https://github.com/stacklok/minder/commit/45750b4e9fb2de33365758366e06c19e999bd2eb", "source": "security-advisories@github.com"}, {"url": "https://github.com/stacklok/minder/security/advisories/GHSA-v627-69v2-xx37", "source": "security-advisories@github.com"}, {"url": "https://github.com/stacklok/minder/blob/a115c8524fbd582b2b277eaadce024bebbded508/internal/controlplane/handlers_repositories.go#L277-L278", "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "https://github.com/stacklok/minder/blob/main/internal/controlplane/handlers_repositories.go#L257-L299", "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "https://github.com/stacklok/minder/commit/45750b4e9fb2de33365758366e06c19e999bd2eb", "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "https://github.com/stacklok/minder/security/advisories/GHSA-v627-69v2-xx37", "source": "af854a3a-2127-422b-91ae-364da2661108"}], "vulnStatus": "Awaiting Analysis", "weaknesses": [{"type": "Secondary", "source": "security-advisories@github.com", "description": [{"lang": "en", "value": "CWE-285"}]}], "descriptions": [{"lang": "en", "value": "Minder is a software supply chain security platform. Prior to version 0.0.33, a Minder user can use the endpoints `GetRepositoryByName`, `DeleteRepositoryByName`, and `GetArtifactByName` to access any repository in the database, irrespective of who owns the repo and any permissions present. The database query checks by repo owner, repo name and provider name (which is always `github`). These query values are not distinct for the particular user - as long as the user has valid credentials and a provider, they can set the repo owner/name to any value they want and the server will return information on this repo. Version 0.0.33 contains a patch for this issue."}, {"lang": "es", "value": "Minder es una plataforma de seguridad de la cadena de suministro de software. Antes de la versi\u00f3n 0.0.33, un usuario de Minder puede usar los endpoint `GetRepositoryByName`, `DeleteRepositoryByName` y `GetArtifactByName` para acceder a cualquier repositorio en la base de datos, independientemente de qui\u00e9n sea el propietario del repositorio y los permisos presentes. La consulta de la base de datos verifica por propietario del repositorio, nombre del repositorio y nombre del proveedor (que siempre es \"github\"). Estos valores de consulta no son distintos para el usuario en particular: siempre que el usuario tenga credenciales v\u00e1lidas y un proveedor, puede establecer el propietario/nombre del repositorio en cualquier valor que desee y el servidor devolver\u00e1 informaci\u00f3n sobre este repositorio. La versi\u00f3n 0.0.33 contiene un parche para este problema."}], "lastModified": "2024-11-21T09:05:24.950", "sourceIdentifier": "security-advisories@github.com"}