logo

CVE-2024-27097 ckan

Package

Manager: pip
Name: ckan
Vulnerable Version: >=0 <2.9.11 || >=2.10.0 <2.10.4

Severity

Level: Medium

CVSS v3.1: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N

CVSS v4.0: CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N

EPSS: 0.00261 pctl0.49265

Details

Potential log injection in reset user endpoint in CKAN A user endpoint didn't perform filtering on an incoming parameter, which was added directly to the application log. This could lead to an attacker injecting false log entries or corrupt the log file format. ### Patches This has been fixed in the CKAN 2.9.11 and 2.10.4 versions ### Workarounds Override the `/user/reset` endpoint to filter the `id` parameter in order to exclude newlines

Metadata

Created: 2024-03-13T15:30:03Z
Modified: 2024-03-13T22:28:40Z
Source: https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2024/03/GHSA-8g38-3m6v-232j/GHSA-8g38-3m6v-232j.json
CWE IDs: ["CWE-117", "CWE-532"]
Alternative ID: GHSA-8g38-3m6v-232j
Finding: F059
Auto approve: 1