{"dataType":"CVE_RECORD","dataVersion":"5.1","cveMetadata":{"cveId":"CVE-2024-8135","assignerOrgId":"1af790b2-7ee1-4545-860a-a788eba489b5","state":"PUBLISHED","assignerShortName":"VulDB","dateReserved":"2024-08-23T18:33:29.992Z","datePublished":"2024-08-24T21:31:04.333Z","dateUpdated":"2024-08-26T17:29:08.496Z"},"containers":{"cna":{"providerMetadata":{"orgId":"1af790b2-7ee1-4545-860a-a788eba489b5","shortName":"VulDB","dateUpdated":"2024-08-24T21:31:04.333Z"},"title":"Go-Tribe gotribe token.go Sign hard-coded credentials","problemTypes":[{"descriptions":[{"type":"CWE","cweId":"CWE-798","lang":"en","description":"CWE-798 Hard-coded Credentials"}]}],"affected":[{"vendor":"Go-Tribe","product":"gotribe","versions":[{"version":"cd3ccd32cd77852c9ea73f986eaf8c301cfb6310","status":"affected"}]}],"descriptions":[{"lang":"en","value":"A vulnerability classified as critical has been found in Go-Tribe gotribe up to cd3ccd32cd77852c9ea73f986eaf8c301cfb6310. Affected is the function Sign of the file pkg/token/token.go. The manipulation of the argument config.key leads to hard-coded credentials. Continious delivery with rolling releases is used by this product. Therefore, no version details of affected nor updated releases are available. The patch is identified as 4fb9b9e80a2beedd09d9fde4b9cf5bd510baf18f. It is recommended to apply a patch to fix this issue."},{"lang":"de","value":"Es wurde eine kritische Schwachstelle in Go-Tribe gotribe bis cd3ccd32cd77852c9ea73f986eaf8c301cfb6310 entdeckt. Hiervon betroffen ist die Funktion Sign der Datei pkg/token/token.go. Mit der Manipulation des Arguments config.key mit unbekannten Daten kann eine hard-coded credentials-Schwachstelle ausgenutzt werden. Dieses Produkt verzichtet auf eine Versionierung und verwendet stattdessen Rolling Releases. Deshalb sind keine Details zu betroffenen oder zu aktualisierende Versionen vorhanden. Der Patch wird als 4fb9b9e80a2beedd09d9fde4b9cf5bd510baf18f bezeichnet. Als bestmögliche Massnahme wird Patching empfohlen."}],"metrics":[{"cvssV4_0":{"version":"4.0","baseScore":5.3,"vectorString":"CVSS:4.0/AV:A/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N","baseSeverity":"MEDIUM"}},{"cvssV3_1":{"version":"3.1","baseScore":6.3,"vectorString":"CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L","baseSeverity":"MEDIUM"}},{"cvssV3_0":{"version":"3.0","baseScore":6.3,"vectorString":"CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L","baseSeverity":"MEDIUM"}},{"cvssV2_0":{"version":"2.0","baseScore":5.8,"vectorString":"AV:A/AC:L/Au:N/C:P/I:P/A:P"}}],"timeline":[{"time":"2024-08-23T00:00:00.000Z","lang":"en","value":"Advisory disclosed"},{"time":"2024-08-23T02:00:00.000Z","lang":"en","value":"VulDB entry created"},{"time":"2024-08-23T20:39:22.000Z","lang":"en","value":"VulDB entry last update"}],"credits":[{"lang":"en","value":"zihe (VulDB User)","type":"reporter"}],"references":[{"url":"https://vuldb.com/?id.275706","name":"VDB-275706 | Go-Tribe gotribe token.go Sign hard-coded credentials","tags":["vdb-entry","technical-description"]},{"url":"https://vuldb.com/?ctiid.275706","name":"VDB-275706 | CTI Indicators (IOB, IOC, TTP, IOA)","tags":["signature","permissions-required"]},{"url":"https://vuldb.com/?submit.396310","name":"Submit #396310 | Go-Tribe gotribe None Hard-coded Credentials","tags":["third-party-advisory"]},{"url":"https://github.com/Go-Tribe/gotribe/issues/1","tags":["issue-tracking"]},{"url":"https://github.com/Go-Tribe/gotribe/issues/1#issuecomment-2307205980","tags":["issue-tracking"]},{"url":"https://github.com/Go-Tribe/gotribe/commit/4fb9b9e80a2beedd09d9fde4b9cf5bd510baf18f","tags":["patch"]}]},"adp":[{"metrics":[{"other":{"type":"ssvc","content":{"timestamp":"2024-08-26T17:28:35.651237Z","id":"CVE-2024-8135","options":[{"Exploitation":"none"},{"Automatable":"no"},{"Technical Impact":"partial"}],"role":"CISA Coordinator","version":"2.0.3"}}}],"title":"CISA ADP Vulnrichment","providerMetadata":{"orgId":"134c704f-9b21-4f2e-91b3-4a467353bcc0","shortName":"CISA-ADP","dateUpdated":"2024-08-26T17:29:08.496Z"}}]}}