{"dataType":"CVE_RECORD","dataVersion":"5.1","cveMetadata":{"cveId":"CVE-2024-6834","assignerOrgId":"b1336bef-059d-4e13-b11b-9a6ef21b3c78","state":"PUBLISHED","assignerShortName":"Zowe","dateReserved":"2024-07-17T14:44:06.201Z","datePublished":"2024-07-17T14:44:06.283Z","dateUpdated":"2024-08-13T21:00:07.595Z"},"containers":{"cna":{"title":"Imperative Local Command Injection allows Activity Masking","affected":[{"vendor":"Open Mainframe Project","product":"Zowe","versions":[{"version":"2.4.0","status":"affected","lessThan":"2.14.0","versionType":"semver"}]}],"descriptions":[{"lang":"en","value":"A vulnerability in APIML Spring Cloud Gateway which leverages user privileges by unexpected signing proxied request by Zowe's client certificate. This allows access to a user to the endpoints requiring an internal client certificate without any credentials. It could lead to managing components in there and allow an attacker to handle the whole communication including user credentials."}],"metrics":[{"format":"CVSS","scenarios":[{"lang":"en","value":"GENERAL"}],"cvssV3_1":{"baseScore":9,"baseSeverity":"CRITICAL","version":"3.1","attackVector":"LOCAL","attackComplexity":"LOW","privilegesRequired":"LOW","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"LOW","integrityImpact":"NONE","availabilityImpact":"NONE","vectorString":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H/E:F/RL:T/RC:C/CR:H/IR:H/AR:M/MAV:N/MAC:L/MPR:N/MUI:N/MS:C/MC:H/MI:H/MA:H"}}],"solutions":[{"lang":"en","value":"This issue is fixed in the APIML 2.14.4 (Zowe 2.14) and later. Fixed by https://github.com/zowe/api-layer/pull/3203 and https://github.com/zowe/api-layer/pull/3273"}],"exploits":[{"lang":"en","value":"There are no known exploits of this issue however exploits targeting this issue are publicly available."}],"credits":[{"lang":"en","value":"Pavel Jares","type":"finder"},{"lang":"en","value":"Andrej Chmelo","type":"finder"}],"providerMetadata":{"orgId":"b1336bef-059d-4e13-b11b-9a6ef21b3c78","shortName":"Zowe","dateUpdated":"2024-07-17T14:44:06.283Z"},"references":[{"tags":["product"],"url":"https://github.com/zowe/api-layer"}]},"adp":[{"problemTypes":[{"descriptions":[{"type":"CWE","cweId":"CWE-250","lang":"en","description":"CWE-250 Execution with Unnecessary Privileges"}]}],"affected":[{"vendor":"linuxfoundation","product":"zowe_api_mediation_layer","cpes":["cpe:2.3:a:linuxfoundation:zowe_api_mediation_layer:*:*:*:*:*:*:*:*"],"defaultStatus":"unknown","versions":[{"version":"2.4.0","status":"affected","lessThan":"2.14.0","versionType":"semver"}]}],"metrics":[{"other":{"type":"ssvc","content":{"timestamp":"2024-07-17T15:12:02.406649Z","id":"CVE-2024-6834","options":[{"Exploitation":"none"},{"Automatable":"no"},{"Technical Impact":"total"}],"role":"CISA Coordinator","version":"2.0.3"}}}],"title":"CISA ADP Vulnrichment","providerMetadata":{"orgId":"134c704f-9b21-4f2e-91b3-4a467353bcc0","shortName":"CISA-ADP","dateUpdated":"2024-08-13T21:00:07.595Z"}},{"providerMetadata":{"orgId":"af854a3a-2127-422b-91ae-364da2661108","shortName":"CVE","dateUpdated":"2024-08-01T21:45:38.340Z"},"title":"CVE Program Container","references":[{"tags":["product","x_transferred"],"url":"https://github.com/zowe/api-layer"}]}]}}