Ecosyste.ms: Advisories
An open API service providing security vulnerability metadata for many open source software ecosystems.
Security Advisories: GSA_kwCzR0hTQS1yam1xLTZ2NTUtNHJqds0y6w
Improper Authorization in org.cometd.oort
Impact
Internal usage of Oort and Seti channels is improperly authorized, so any remote user could subscribe and publish to those channels.
By subscribing to those channels, a remote user may be able to watch cluster-internal traffic that contains other user's (possibly sensitive) data.
By publishing to those channels, a remote user may be able to create/modify/delete other user's data and modify the cluster structure.
The issue impacts any version up to 5.0.10, 6.0.5 and 7.0.5.
Patches
The issue has been fixed in 5.0.11, 6.0.6 and 7.0.6.
Workarounds
The workaround is to install a custom SecurityPolicy
that forbids subscription and publishing to remote, non-Oort, sessions on Oort and Seti channels.
This workaround could be implemented in any affected version.
References
cometd/cometd#1146
For more information
If you have any questions or comments about this advisory:
- Email us at [email protected]
Credits
https://www.redteam-pentesting.de/
Permalink: https://github.com/advisories/GHSA-rjmq-6v55-4rjvJSON: https://advisories.ecosyste.ms/api/v1/advisories/GSA_kwCzR0hTQS1yam1xLTZ2NTUtNHJqds0y6w
Source: GitHub Advisory Database
Origin: Unspecified
Severity: High
Classification: General
Published: about 2 years ago
Updated: over 1 year ago
CVSS Score: 8.1
CVSS vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N
Identifiers: GHSA-rjmq-6v55-4rjv, CVE-2022-24721
References:
- https://github.com/cometd/cometd/security/advisories/GHSA-rjmq-6v55-4rjv
- https://github.com/cometd/cometd/commit/bb445a143fbf320f17c62e340455cd74acfb5929
- https://nvd.nist.gov/vuln/detail/CVE-2022-24721
- https://github.com/cometd/cometd/issues/1146
- https://github.com/advisories/GHSA-rjmq-6v55-4rjv
Blast Radius: 11.0
Affected Packages
maven:org.cometd.java:cometd-java-oort
Dependent packages: 3Dependent repositories: 23
Downloads:
Affected Version Ranges: >= 7.0.0, < 7.0.6, >= 6.0.0, < 6.0.6, < 5.0.11
Fixed in: 7.0.6, 6.0.6, 5.0.11
All affected versions: 1.0.0, 1.0.1, 1.1.0, 1.1.1, 1.1.2, 1.1.3, 1.1.4, 1.1.5, 2.0.0, 2.1.0, 2.1.1, 2.2.0, 2.3.0, 2.3.1, 2.4.0, 2.4.1, 2.4.2, 2.4.3, 2.5.0, 2.5.1, 2.6.0, 2.7.0, 2.8.0, 2.9.0, 2.9.1, 3.0.0, 3.0.1, 3.0.2, 3.0.3, 3.0.4, 3.0.5, 3.0.6, 3.0.7, 3.0.8, 3.0.9, 3.0.10, 3.1.0, 3.1.1, 3.1.2, 3.1.3, 3.1.4, 3.1.5, 3.1.6, 3.1.7, 3.1.8, 3.1.9, 3.1.10, 3.1.11, 3.1.12, 3.1.13, 3.1.14, 4.0.0, 4.0.1, 4.0.2, 4.0.3, 4.0.4, 4.0.5, 4.0.6, 4.0.7, 4.0.8, 4.0.9, 5.0.0, 5.0.1, 5.0.2, 5.0.3, 5.0.4, 5.0.5, 5.0.6, 5.0.7, 5.0.8, 5.0.9, 5.0.10, 6.0.0, 6.0.1, 6.0.2, 6.0.3, 6.0.4, 6.0.5, 7.0.0, 7.0.1, 7.0.2, 7.0.3, 7.0.5
All unaffected versions: 5.0.11, 5.0.12, 5.0.13, 5.0.14, 5.0.15, 5.0.16, 5.0.17, 5.0.18, 6.0.6, 6.0.7, 6.0.8, 6.0.9, 6.0.10, 6.0.11, 6.0.12, 6.0.13, 7.0.6, 7.0.7, 7.0.8, 7.0.9, 7.0.10, 7.0.11, 7.0.12, 7.0.13