
CVE-2023-44487 – HTTP/2 Rapid Reset Attack Vulnerability
https://notcve.org/view.php?id=CVE-2023-44487
10 Oct 2023 — The HTTP/2 protocol allows a denial of service (server resource consumption) because request cancellation can reset many streams quickly, as exploited in the wild in August through October 2023. El protocolo HTTP/2 permite una denegación de servicio (consumo de recursos del servidor) porque la cancelación de solicitudes puede restablecer muchas transmisiones rápidamente, como se explotó en la naturaleza entre agosto y octubre de 2023. A flaw was found in handling multiplexed streams in the HTTP/2 protocol. ... • https://github.com/imabee101/CVE-2023-44487 • CWE-400: Uncontrolled Resource Consumption •

CVE-2023-40299
https://notcve.org/view.php?id=CVE-2023-40299
04 Oct 2023 — Kong Insomnia 2023.4.0 on macOS allows attackers to execute code and access restricted files, or make requests for TCC permissions, by using the DYLD_INSERT_LIBRARIES environment variable. Kong Insomnia 2023.4.0 en macOS permite a los atacantes ejecutar código y acceder a archivos restringidos, o realizar solicitudes de permisos TCC, utilizando la variable de entorno DYLD_INSERT_LIBRARIES. • https://github.com/Kong/insomnia/pull/6217/commits • CWE-114: Process Control •

CVE-2023-2418 – Konga Login API random values
https://notcve.org/view.php?id=CVE-2023-2418
29 Apr 2023 — A vulnerability was found in Konga 2.8.3 on Kong. It has been classified as problematic. This affects an unknown part of the component Login API. The manipulation leads to insufficiently random values. The complexity of an attack is rather high. • https://github.com/advisories/GHSA-9g4c-xm3g-f8hq • CWE-330: Use of Insufficiently Random Values •

CVE-2020-36661 – Kong lua-multipart multipart.lua is_header redos
https://notcve.org/view.php?id=CVE-2020-36661
12 Feb 2023 — A vulnerability was found in Kong lua-multipart 0.5.8-1. It has been declared as problematic. This vulnerability affects the function is_header of the file src/multipart.lua. The manipulation leads to inefficient regular expression complexity. Upgrading to version 0.5.9-1 is able to address this issue. • https://github.com/Kong/lua-multipart/commit/d632e5df43a2928fd537784a99a79dec288bf01b • CWE-1333: Inefficient Regular Expression Complexity •

CVE-2021-27306
https://notcve.org/view.php?id=CVE-2021-27306
18 Mar 2021 — An improper access control vulnerability in the JWT plugin in Kong Gateway prior to 2.3.2.0 allows unauthenticated users access to authenticated routes without a valid token JWT. Una vulnerabilidad de control de acceso inapropiado en el plugin JWT en Kong Gateway versiones anteriores a 2.3.0.0, permite a usuarios no autenticados acceder a rutas autenticadas sin un token JWT válido • https://docs.konghq.com/enterprise/changelog/#core-1 • CWE-706: Use of Incorrectly-Resolved Name or Reference •

CVE-2020-11710
https://notcve.org/view.php?id=CVE-2020-11710
12 Apr 2020 — An issue was discovered in docker-kong (for Kong) through 2.0.3. The admin API port may be accessible on interfaces other than 127.0.0.1. NOTE: The vendor argue that this CVE is not a vulnerability because it has an inaccurate bug scope and patch links. “1) Inaccurate Bug Scope - The issue scope was on Kong's docker-compose template, and not Kong's docker image itself. In reality, this issue is not associated with any version of the Kong gateway. As such, the description stating ‘An issue was discovered in ... • https://github.com/Kong/docker-kong/commit/dfa095cadf7e8309155be51982d8720daf32e31c •