Description
A vulnerability in APIML Spring Cloud Gateway which leverages user privileges by unexpected signing proxied request by Zowe's client certificate. This allows access to a user to the endpoints requiring an internal client certificate without any credentials. It could lead to managing components in there and allow an attacker to handle the whole communication including user credentials.
No analysis available yet.
Remediation
Vendor Solution
This issue is fixed in the APIML 2.14.4 (Zowe 2.14) and later. Fixed by https://github.com/zowe/api-layer/pull/3203 and https://github.com/zowe/api-layer/pull/3273
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2024-47844 | A vulnerability in APIML Spring Cloud Gateway which leverages user privileges by unexpected signing proxied request by Zowe's client certificate. This allows access to a user to the endpoints requiring an internal client certificate without any credentials. It could lead to managing components in there and allow an attacker to handle the whole communication including user credentials. |
References
| Link | Providers |
|---|---|
| https://github.com/zowe/api-layer |
|
History
No history.
Subscriptions
No data.
Status: PUBLISHED
Assigner: Zowe
Published:
Updated: 2024-08-13T21:00:07.595Z
Reserved: 2024-07-17T14:44:06.201Z
Link: CVE-2024-6834
Updated: 2024-08-01T21:45:38.340Z
Status : Deferred
Published: 2024-07-17T15:15:14.970
Modified: 2026-04-15T00:35:42.020
Link: CVE-2024-6834
No data.
OpenCVE Enrichment
No data.
Weaknesses
EUVD