Lucene search

K
cveEclipseCVE-2024-8642
HistorySep 11, 2024 - 2:15 p.m.

CVE-2024-8642

2024-09-1114:15:14
CWE-287
CWE-305
CWE-303
eclipse
web.nvd.nist.gov
25
eclipse dataspace components
consumerpulltransfertokenvalidationapicontroller
token validity
dataplane
http proxy consumer pull
transfer-data-plane
deprecated code
dataplane signaling
cve-2024-8642

CVSS3

8.1

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N

CVSS4

5

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

HIGH

User Interaction

NONE

CVSS:4.0/AV:N/AC:L/AT:P/PR:H/UI:N/VC:N/SC:H/VI:N/SI:H/VA:N/SA:N/U:Green/RE:L

AI Score

6.7

Confidence

High

EPSS

0.001

Percentile

27.5%

In Eclipse Dataspace Components, from version 0.5.0 and before version 0.9.0, the ConsumerPullTransferTokenValidationApiController does not check for token validity (expiry, not-before, issuance date), which can allow an attacker to bypass the check for token expiration. The issue requires to have a dataplane configured to support http proxy consumer pull AND include the module “transfer-data-plane”. The affected code was marked deprecated from the version 0.6.0 in favour of Dataplane Signaling. In 0.9.0 the vulnerable code has been removed.

Affected configurations

Nvd
Node
eclipseeclipse_dataspace_componentsRange0.5.00.9.0
VendorProductVersionCPE
eclipseeclipse_dataspace_components*cpe:2.3:a:eclipse:eclipse_dataspace_components:*:*:*:*:*:*:*:*

CNA Affected

[
  {
    "collectionURL": "https://repo.maven.apache.org/maven2/",
    "defaultStatus": "unaffected",
    "modules": [
      "transfer-data-plane"
    ],
    "packageName": "org.eclipse.edc:transfer-data-plane",
    "product": "Eclipse EDC Connector",
    "repo": "https://github.com/eclipse-edc/Connector",
    "vendor": "Eclipse Foundation",
    "versions": [
      {
        "lessThan": "0.9.0",
        "status": "affected",
        "version": "0.5.0",
        "versionType": "semver"
      }
    ]
  }
]

CVSS3

8.1

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N

CVSS4

5

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

HIGH

User Interaction

NONE

CVSS:4.0/AV:N/AC:L/AT:P/PR:H/UI:N/VC:N/SC:H/VI:N/SI:H/VA:N/SA:N/U:Green/RE:L

AI Score

6.7

Confidence

High

EPSS

0.001

Percentile

27.5%

Related for CVE-2024-8642