A vulnerability in APIML Spring Cloud Gateway which leverages user privileges by unexpected signing proxied request by Zowe's client certificate. This allows access to a user to the endpoints requiring an internal client certificate without any credentials. It could lead to managing components in there and allow an attacker to handle the whole communication including user credentials.
Metrics
Affected Vendors & Products
Advisories
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2024-47844 | A vulnerability in APIML Spring Cloud Gateway which leverages user privileges by unexpected signing proxied request by Zowe's client certificate. This allows access to a user to the endpoints requiring an internal client certificate without any credentials. It could lead to managing components in there and allow an attacker to handle the whole communication including user credentials. |
Fixes
Solution
This issue is fixed in the APIML 2.14.4 (Zowe 2.14) and later. Fixed by https://github.com/zowe/api-layer/pull/3203 and https://github.com/zowe/api-layer/pull/3273
Workaround
No workaround given by the vendor.
References
| Link | Providers |
|---|---|
| https://github.com/zowe/api-layer |
|
History
No history.
Status: PUBLISHED
Assigner: Zowe
Published:
Updated: 2024-08-13T21:00:07.595Z
Reserved: 2024-07-17T14:44:06.201Z
Link: CVE-2024-6834
Updated: 2024-08-01T21:45:38.340Z
Status : Awaiting Analysis
Published: 2024-07-17T15:15:14.970
Modified: 2024-11-21T09:50:23.343
Link: CVE-2024-6834
No data.
OpenCVE Enrichment
No data.
EUVD