Apollo is a configuration management system. A vulnerability exists in the synchronization configuration feature that allows users to craft specific requests to bypass permission checks. This exploit enables them to modify a namespace without the necessary permissions. The issue was addressed with an input parameter check which was released in version 2.3.0.
History

Mon, 26 Aug 2024 18:45:00 +0000

Type Values Removed Values Added
First Time appeared Apolloconfig
Apolloconfig apollo
Weaknesses NVD-CWE-Other
CPEs cpe:2.3:a:apolloconfig:apollo:*:*:*:*:*:*:*:*
Vendors & Products Apolloconfig
Apolloconfig apollo

Tue, 20 Aug 2024 18:30:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Tue, 20 Aug 2024 15:00:00 +0000

Type Values Removed Values Added
Description Apollo is a configuration management system. A vulnerability exists in the synchronization configuration feature that allows users to craft specific requests to bypass permission checks. This exploit enables them to modify a namespace without the necessary permissions. The issue was addressed with an input parameter check which was released in version 2.3.0.
Title Potential unauthorized access issue in apollo-portal
Weaknesses CWE-284
References
Metrics cvssV3_1

{'score': 4.3, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N'}


cve-icon MITRE

Status: PUBLISHED

Assigner: GitHub_M

Published: 2024-08-20T14:50:01.163Z

Updated: 2024-08-20T17:18:53.095Z

Reserved: 2024-08-12T18:02:04.965Z

Link: CVE-2024-43397

cve-icon Vulnrichment

Updated: 2024-08-20T17:18:40.540Z

cve-icon NVD

Status : Analyzed

Published: 2024-08-20T15:15:23.673

Modified: 2024-08-26T18:28:42.230

Link: CVE-2024-43397

cve-icon Redhat

No data.