cve-2024-32969
Vulnerability from cvelistv5
Published
2024-05-23 08:22
Modified
2024-08-02 02:27
Severity ?
EPSS score ?
Summary
vantage6 collaboration admins can extend their influence by expanding the collaboration
References
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2024-32969", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-05-23T15:35:32.312152Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-06-04T17:50:23.345Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" }, { "providerMetadata": { "dateUpdated": "2024-08-02T02:27:53.367Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "https://github.com/vantage6/vantage6/security/advisories/GHSA-99r4-cjp4-3hmx", "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://github.com/vantage6/vantage6/security/advisories/GHSA-99r4-cjp4-3hmx" }, { "name": "https://github.com/vantage6/vantage6/commit/27f4ee3fade5f4cbcf3e60899c9a2a91145e0b56", "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://github.com/vantage6/vantage6/commit/27f4ee3fade5f4cbcf3e60899c9a2a91145e0b56" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "vantage6", "vendor": "vantage6", "versions": [ { "status": "affected", "version": "\u003c 4.5.0rc3" } ] } ], "descriptions": [ { "lang": "en", "value": "vantage6 is an open-source infrastructure for privacy preserving analysis. Collaboration administrators can add extra organizations to their collaboration that can extend their influence. For example, organizations that they include can then create new users for which they know the passwords, and use that to read task results of other collaborations that that organization is involved in. This is only relatively trusted users - with access to manage a collaboration - are able to do this, which reduces the impact. This vulnerability was patched in version 4.5.0rc3.\n" } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 2.7, "baseSeverity": "LOW", "confidentialityImpact": "LOW", "integrityImpact": "NONE", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:N/A:N", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-284", "description": "CWE-284: Improper Access Control", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-05-23T08:22:57.564Z", "orgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "shortName": "GitHub_M" }, "references": [ { "name": "https://github.com/vantage6/vantage6/security/advisories/GHSA-99r4-cjp4-3hmx", "tags": [ "x_refsource_CONFIRM" ], "url": "https://github.com/vantage6/vantage6/security/advisories/GHSA-99r4-cjp4-3hmx" }, { "name": "https://github.com/vantage6/vantage6/commit/27f4ee3fade5f4cbcf3e60899c9a2a91145e0b56", "tags": [ "x_refsource_MISC" ], "url": "https://github.com/vantage6/vantage6/commit/27f4ee3fade5f4cbcf3e60899c9a2a91145e0b56" } ], "source": { "advisory": "GHSA-99r4-cjp4-3hmx", "discovery": "UNKNOWN" }, "title": "vantage6 collaboration admins can extend their influence by expanding the collaboration" } }, "cveMetadata": { "assignerOrgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "assignerShortName": "GitHub_M", "cveId": "CVE-2024-32969", "datePublished": "2024-05-23T08:22:57.564Z", "dateReserved": "2024-04-22T15:14:59.165Z", "dateUpdated": "2024-08-02T02:27:53.367Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1", "meta": { "nvd": "{\"cve\":{\"id\":\"CVE-2024-32969\",\"sourceIdentifier\":\"security-advisories@github.com\",\"published\":\"2024-05-23T09:15:09.350\",\"lastModified\":\"2024-05-24T01:15:30.977\",\"vulnStatus\":\"Awaiting Analysis\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"vantage6 is an open-source infrastructure for privacy preserving analysis. Collaboration administrators can add extra organizations to their collaboration that can extend their influence. For example, organizations that they include can then create new users for which they know the passwords, and use that to read task results of other collaborations that that organization is involved in. This is only relatively trusted users - with access to manage a collaboration - are able to do this, which reduces the impact. This vulnerability was patched in version 4.5.0rc3.\\n\"},{\"lang\":\"es\",\"value\":\"vantage6 es una infraestructura de c\u00f3digo abierto para an\u00e1lisis de preservaci\u00f3n de la privacidad. Los administradores de colaboraci\u00f3n pueden agregar organizaciones adicionales a su colaboraci\u00f3n que puedan ampliar su influencia. Por ejemplo, las organizaciones que incluyen pueden crear nuevos usuarios cuyas contrase\u00f1as conocen y usarlas para leer los resultados de tareas de otras colaboraciones en las que participa esa organizaci\u00f3n. Estos son solo usuarios relativamente confiables, con acceso para administrar una colaboraci\u00f3n. son capaces de hacer esto, lo que reduce el impacto. Esta vulnerabilidad fue parcheada en la versi\u00f3n 4.5.0rc3.\"}],\"metrics\":{\"cvssMetricV31\":[{\"source\":\"security-advisories@github.com\",\"type\":\"Secondary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:N/A:N\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"HIGH\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"LOW\",\"integrityImpact\":\"NONE\",\"availabilityImpact\":\"NONE\",\"baseScore\":2.7,\"baseSeverity\":\"LOW\"},\"exploitabilityScore\":1.2,\"impactScore\":1.4}]},\"weaknesses\":[{\"source\":\"security-advisories@github.com\",\"type\":\"Secondary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-284\"}]}],\"references\":[{\"url\":\"https://github.com/vantage6/vantage6/commit/27f4ee3fade5f4cbcf3e60899c9a2a91145e0b56\",\"source\":\"security-advisories@github.com\"},{\"url\":\"https://github.com/vantage6/vantage6/security/advisories/GHSA-99r4-cjp4-3hmx\",\"source\":\"security-advisories@github.com\"}]}}" } }
Loading...
Loading...
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.