gsd-2024-22194
Vulnerability from gsd
Modified
2024-01-08 06:02
Details
cdo-local-uuid project provides a specialized UUID-generating function that can, on user request, cause a program to generate deterministic UUIDs. An information leakage vulnerability is present in `cdo-local-uuid` at version `0.4.0`, and in `case-utils` in unpatched versions (matching the pattern `0.x.0`) at and since `0.5.0`, before `0.15.0`. The vulnerability stems from a Python function, `cdo_local_uuid.local_uuid()`, and its original implementation `case_utils.local_uuid()`.
Aliases
{ "gsd": { "metadata": { "exploitCode": "unknown", "remediation": "unknown", "reportConfidence": "confirmed", "type": "vulnerability" }, "osvSchema": { "aliases": [ "CVE-2024-22194" ], "details": "cdo-local-uuid project provides a specialized UUID-generating function that can, on user request, cause a program to generate deterministic UUIDs. An information leakage vulnerability is present in `cdo-local-uuid` at version `0.4.0`, and in `case-utils` in unpatched versions (matching the pattern `0.x.0`) at and since `0.5.0`, before `0.15.0`. The vulnerability stems from a Python function, `cdo_local_uuid.local_uuid()`, and its original implementation `case_utils.local_uuid()`. ", "id": "GSD-2024-22194", "modified": "2024-01-08T06:02:13.786497Z", "schema_version": "1.4.0" } }, "namespaces": { "cve.org": { "CVE_data_meta": { "ASSIGNER": "security-advisories@github.com", "ID": "CVE-2024-22194", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "CDO-Utility-Local-UUID", "version": { "version_data": [ { "version_affected": "=", "version_value": "= 0.4.0" }, { "version_affected": "=", "version_value": "= 0.5.0" }, { "version_affected": "=", "version_value": "= 0.6.0" }, { "version_affected": "=", "version_value": "= 0.7.0" }, { "version_affected": "=", "version_value": "= 0.8.0" }, { "version_affected": "=", "version_value": "= 0.9.0" }, { "version_affected": "=", "version_value": "= 0.10.0" }, { "version_affected": "=", "version_value": "= 0.11.0" }, { "version_affected": "=", "version_value": "= 0.12.0" } ] } } ] }, "vendor_name": "Cyber-Domain-Ontology" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "cdo-local-uuid project provides a specialized UUID-generating function that can, on user request, cause a program to generate deterministic UUIDs. An information leakage vulnerability is present in `cdo-local-uuid` at version `0.4.0`, and in `case-utils` in unpatched versions (matching the pattern `0.x.0`) at and since `0.5.0`, before `0.15.0`. The vulnerability stems from a Python function, `cdo_local_uuid.local_uuid()`, and its original implementation `case_utils.local_uuid()`. " } ] }, "impact": { "cvss": [ { "attackComplexity": "HIGH", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 2.2, "baseSeverity": "LOW", "confidentialityImpact": "LOW", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:L/I:N/A:N", "version": "3.1" } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "cweId": "CWE-215", "lang": "eng", "value": "CWE-215: Insertion of Sensitive Information Into Debugging Code" } ] }, { "description": [ { "cweId": "CWE-337", "lang": "eng", "value": "CWE-337: Predictable Seed in Pseudo-Random Number Generator (PRNG)" } ] } ] }, "references": { "reference_data": [ { "name": "https://github.com/Cyber-Domain-Ontology/CDO-Utility-Local-UUID/security/advisories/GHSA-rgrf-6mf5-m882", "refsource": "MISC", "url": "https://github.com/Cyber-Domain-Ontology/CDO-Utility-Local-UUID/security/advisories/GHSA-rgrf-6mf5-m882" }, { "name": "https://github.com/Cyber-Domain-Ontology/CDO-Utility-Local-UUID/pull/3", "refsource": "MISC", "url": "https://github.com/Cyber-Domain-Ontology/CDO-Utility-Local-UUID/pull/3" }, { "name": "https://github.com/Cyber-Domain-Ontology/CDO-Utility-Local-UUID/pull/4", "refsource": "MISC", "url": "https://github.com/Cyber-Domain-Ontology/CDO-Utility-Local-UUID/pull/4" }, { "name": "https://github.com/Cyber-Domain-Ontology/CDO-Utility-Local-UUID/commit/9e78f7cb1075728d0aafc918514f32a1392cd235", "refsource": "MISC", "url": "https://github.com/Cyber-Domain-Ontology/CDO-Utility-Local-UUID/commit/9e78f7cb1075728d0aafc918514f32a1392cd235" }, { "name": "https://github.com/casework/CASE-Utilities-Python/commit/00864cd12de7c50d882dd1a74915d32e939c25f9", "refsource": "MISC", "url": "https://github.com/casework/CASE-Utilities-Python/commit/00864cd12de7c50d882dd1a74915d32e939c25f9" }, { "name": "https://github.com/casework/CASE-Utilities-Python/commit/1cccae8eb3cf94b3a28f6490efa0fbf5c82ebd6b", "refsource": "MISC", "url": "https://github.com/casework/CASE-Utilities-Python/commit/1cccae8eb3cf94b3a28f6490efa0fbf5c82ebd6b" }, { "name": "https://github.com/casework/CASE-Utilities-Python/commit/5acb929dfb599709d1c8c90d1824dd79e0fd9e10", "refsource": "MISC", "url": "https://github.com/casework/CASE-Utilities-Python/commit/5acb929dfb599709d1c8c90d1824dd79e0fd9e10" }, { "name": "https://github.com/casework/CASE-Utilities-Python/commit/7e02d18383eabbeb9fb4ec97d81438c9980a4790", "refsource": "MISC", "url": "https://github.com/casework/CASE-Utilities-Python/commit/7e02d18383eabbeb9fb4ec97d81438c9980a4790" }, { "name": "https://github.com/casework/CASE-Utilities-Python/commit/80551f49241c874c7c50e14abe05c5017630dad2", "refsource": "MISC", "url": "https://github.com/casework/CASE-Utilities-Python/commit/80551f49241c874c7c50e14abe05c5017630dad2" }, { "name": "https://github.com/casework/CASE-Utilities-Python/commit/939775f956796d0432ecabbf62782ed7ad1007b5", "refsource": "MISC", "url": "https://github.com/casework/CASE-Utilities-Python/commit/939775f956796d0432ecabbf62782ed7ad1007b5" }, { "name": "https://github.com/casework/CASE-Utilities-Python/commit/db428a0745dac4fdd888ced9c52f617695519f9d", "refsource": "MISC", "url": "https://github.com/casework/CASE-Utilities-Python/commit/db428a0745dac4fdd888ced9c52f617695519f9d" }, { "name": "https://github.com/casework/CASE-Utilities-Python/commit/e4ffadc3d56fd303b8f465d727c4a58213d311a1", "refsource": "MISC", "url": "https://github.com/casework/CASE-Utilities-Python/commit/e4ffadc3d56fd303b8f465d727c4a58213d311a1" }, { "name": "https://github.com/casework/CASE-Utilities-Python/commit/fca7388f09feccd3b9ea88e6df9c7a43a5349452", "refsource": "MISC", "url": "https://github.com/casework/CASE-Utilities-Python/commit/fca7388f09feccd3b9ea88e6df9c7a43a5349452" }, { "name": "https://github.com/casework/CASE-Utilities-Python/commit/fdc32414eccfcbde6be0fd91b7f491cc0779b02d#diff-e60b9cb8fb480ed27283a030a0898be3475992d78228f4045b12ce5cbb2f0509", "refsource": "MISC", "url": "https://github.com/casework/CASE-Utilities-Python/commit/fdc32414eccfcbde6be0fd91b7f491cc0779b02d#diff-e60b9cb8fb480ed27283a030a0898be3475992d78228f4045b12ce5cbb2f0509" } ] }, "source": { "advisory": "GHSA-rgrf-6mf5-m882", "discovery": "UNKNOWN" } }, "nvd.nist.gov": { "cve": { "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:lfprojects:case_python_utilities:0.5.0:*:*:*:*:python:*:*", "matchCriteriaId": "4E51AD2E-CCCC-49CB-884C-AE7E5520AE03", "vulnerable": true }, { "criteria": "cpe:2.3:a:lfprojects:case_python_utilities:0.6.0:*:*:*:*:python:*:*", "matchCriteriaId": "824DCDCC-5ED0-4B22-9B1C-BED8AB8C829D", "vulnerable": true }, { "criteria": "cpe:2.3:a:lfprojects:case_python_utilities:0.7.0:*:*:*:*:python:*:*", "matchCriteriaId": "29159383-18CE-4726-A720-5A3E51F4FA3E", "vulnerable": true }, { "criteria": "cpe:2.3:a:lfprojects:case_python_utilities:0.8.0:*:*:*:*:python:*:*", "matchCriteriaId": "7782FE6A-5CF4-4C6F-A090-AD35DCEC83D3", "vulnerable": true }, { "criteria": "cpe:2.3:a:lfprojects:case_python_utilities:0.9.0:*:*:*:*:python:*:*", "matchCriteriaId": "B717C054-3F5E-4C4A-A0F9-BB25BB3257F1", "vulnerable": true }, { "criteria": "cpe:2.3:a:lfprojects:case_python_utilities:0.10.0:*:*:*:*:python:*:*", "matchCriteriaId": "17A5F451-9403-426D-8CED-F2D3071572A1", "vulnerable": true }, { "criteria": "cpe:2.3:a:lfprojects:case_python_utilities:0.11.0:*:*:*:*:python:*:*", "matchCriteriaId": "4CCA01E2-7F94-4036-BC86-86A76C5B6261", "vulnerable": true }, { "criteria": "cpe:2.3:a:lfprojects:case_python_utilities:0.12.0:*:*:*:*:python:*:*", "matchCriteriaId": "38A4A141-2D71-4A8E-80A4-9C3B3D25D3C5", "vulnerable": true }, { "criteria": "cpe:2.3:a:lfprojects:case_python_utilities:0.13.0:*:*:*:*:python:*:*", "matchCriteriaId": "971C2825-0C3F-4A19-8E3F-8254D3246B56", "vulnerable": true }, { "criteria": "cpe:2.3:a:lfprojects:case_python_utilities:0.14.0:*:*:*:*:python:*:*", "matchCriteriaId": "7AE69ADE-F5F2-420C-BB31-1DD0FA92CCA2", "vulnerable": true }, { "criteria": "cpe:2.3:a:lfprojects:cdo_local_uuid_utility:0.4.0:*:*:*:*:python:*:*", "matchCriteriaId": "1395DAD2-0463-4F6B-8053-4DCFDE5AD075", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "descriptions": [ { "lang": "en", "value": "cdo-local-uuid project provides a specialized UUID-generating function that can, on user request, cause a program to generate deterministic UUIDs. An information leakage vulnerability is present in `cdo-local-uuid` at version `0.4.0`, and in `case-utils` in unpatched versions (matching the pattern `0.x.0`) at and since `0.5.0`, before `0.15.0`. The vulnerability stems from a Python function, `cdo_local_uuid.local_uuid()`, and its original implementation `case_utils.local_uuid()`. " }, { "lang": "es", "value": "El proyecto cdo-local-uuid proporciona una funci\u00f3n especializada de generaci\u00f3n de UUID que puede, a petici\u00f3n del usuario, hacer que un programa genere UUID deterministas. Una vulnerabilidad de fuga de informaci\u00f3n est\u00e1 presente en `cdo-local-uuid` en la versi\u00f3n `0.4.0`, y en `case-utils` en versiones sin parches (que coinciden con el patr\u00f3n `0.x.0`) en y desde `0.5. 0`, antes de `0.15.0`. La vulnerabilidad surge de una funci\u00f3n de Python, `cdo_local_uuid.local_uuid()`, y su implementaci\u00f3n original `case_utils.local_uuid()`." } ], "id": "CVE-2024-22194", "lastModified": "2024-01-19T19:03:31.737", "metrics": { "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 2.8, "baseSeverity": "LOW", "confidentialityImpact": "LOW", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:L/I:N/A:N", "version": "3.1" }, "exploitabilityScore": 1.3, "impactScore": 1.4, "source": "nvd@nist.gov", "type": "Primary" }, { "cvssData": { "attackComplexity": "HIGH", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 2.2, "baseSeverity": "LOW", "confidentialityImpact": "LOW", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:L/I:N/A:N", "version": "3.1" }, "exploitabilityScore": 0.8, "impactScore": 1.4, "source": "security-advisories@github.com", "type": "Secondary" } ] }, "published": "2024-01-11T03:15:10.933", "references": [ { "source": "security-advisories@github.com", "tags": [ "Patch" ], "url": "https://github.com/Cyber-Domain-Ontology/CDO-Utility-Local-UUID/commit/9e78f7cb1075728d0aafc918514f32a1392cd235" }, { "source": "security-advisories@github.com", "tags": [ "Patch" ], "url": "https://github.com/Cyber-Domain-Ontology/CDO-Utility-Local-UUID/pull/3" }, { "source": "security-advisories@github.com", "tags": [ "Patch" ], "url": "https://github.com/Cyber-Domain-Ontology/CDO-Utility-Local-UUID/pull/4" }, { "source": "security-advisories@github.com", "tags": [ "Exploit", "Mitigation", "Third Party Advisory" ], "url": "https://github.com/Cyber-Domain-Ontology/CDO-Utility-Local-UUID/security/advisories/GHSA-rgrf-6mf5-m882" }, { "source": "security-advisories@github.com", "tags": [ "Patch" ], "url": "https://github.com/casework/CASE-Utilities-Python/commit/00864cd12de7c50d882dd1a74915d32e939c25f9" }, { "source": "security-advisories@github.com", "tags": [ "Patch" ], "url": "https://github.com/casework/CASE-Utilities-Python/commit/1cccae8eb3cf94b3a28f6490efa0fbf5c82ebd6b" }, { "source": "security-advisories@github.com", "tags": [ "Patch" ], "url": "https://github.com/casework/CASE-Utilities-Python/commit/5acb929dfb599709d1c8c90d1824dd79e0fd9e10" }, { "source": "security-advisories@github.com", "tags": [ "Patch" ], "url": "https://github.com/casework/CASE-Utilities-Python/commit/7e02d18383eabbeb9fb4ec97d81438c9980a4790" }, { "source": "security-advisories@github.com", "tags": [ "Patch" ], "url": "https://github.com/casework/CASE-Utilities-Python/commit/80551f49241c874c7c50e14abe05c5017630dad2" }, { "source": "security-advisories@github.com", "tags": [ "Patch" ], "url": "https://github.com/casework/CASE-Utilities-Python/commit/939775f956796d0432ecabbf62782ed7ad1007b5" }, { "source": "security-advisories@github.com", "tags": [ "Patch" ], "url": "https://github.com/casework/CASE-Utilities-Python/commit/db428a0745dac4fdd888ced9c52f617695519f9d" }, { "source": "security-advisories@github.com", "tags": [ "Patch" ], "url": "https://github.com/casework/CASE-Utilities-Python/commit/e4ffadc3d56fd303b8f465d727c4a58213d311a1" }, { "source": "security-advisories@github.com", "tags": [ "Patch" ], "url": "https://github.com/casework/CASE-Utilities-Python/commit/fca7388f09feccd3b9ea88e6df9c7a43a5349452" }, { "source": "security-advisories@github.com", "tags": [ "Patch" ], "url": "https://github.com/casework/CASE-Utilities-Python/commit/fdc32414eccfcbde6be0fd91b7f491cc0779b02d#diff-e60b9cb8fb480ed27283a030a0898be3475992d78228f4045b12ce5cbb2f0509" } ], "sourceIdentifier": "security-advisories@github.com", "vulnStatus": "Analyzed", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-215" }, { "lang": "en", "value": "CWE-337" } ], "source": "security-advisories@github.com", "type": "Primary" } ] } } } }
Loading...
Loading...
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.