// For flags

CVE-2022-36089

VelaUX APIServer vulnerable to Authentication Bypass by Capture-replay

Severity Score

9.8
*CVSS v3.1

Exploit Likelihood

*EPSS

Affected Versions

*CPE

Public Exploits

0
*Multiple Sources

Exploited in Wild

-
*KEV

Decision

-
*SSVC
Descriptions

KubeVela is an application delivery platform Users using KubeVela's VelaUX APIServer could be affected by an authentication bypass vulnerability. In KubeVela prior to versions 1.4.11 and 1.5.4, VelaUX APIServer uses the `PlatformID` as the signed key to generate the JWT tokens for users. Another API called `getSystemInfo` exposes the platformID. This vulnerability allows users to use the platformID to re-generate the JWT tokens to bypass the authentication. Versions 1.4.11 and 1.5.4 contain a patch for this issue.

KubeVela es una plataforma de entrega de aplicaciones Los usuarios usando VelaUX APIServer de KubeVela podrían verse afectados por una vulnerabilidad de omisión de autenticación. En KubeVela versiones anteriores a 1.4.11 y 1.5.4, VelaUX APIServer usa el "PlatformID" como clave firmada para generar los tokens JWT para usuarios. Otra API llamada "getSystemInfo" expone el platformID. Esta vulnerabilidad permite a usuarios usar el platformID para volver a generar los tokens JWT para omitir la autenticación. Las versiones 1.4.11 y 1.5.4 contienen un parche para este problema

*Credits: N/A
CVSS Scores
Attack Vector
Network
Attack Complexity
Low
Privileges Required
None
User Interaction
None
Scope
Unchanged
Confidentiality
High
Integrity
High
Availability
High
Attack Vector
Network
Attack Complexity
Low
Privileges Required
None
User Interaction
None
Scope
Unchanged
Confidentiality
Low
Integrity
High
Availability
None
* Common Vulnerability Scoring System
SSVC
  • Decision:-
Exploitation
-
Automatable
-
Tech. Impact
-
* Organization's Worst-case Scenario
Timeline
  • 2022-07-15 CVE Reserved
  • 2022-09-07 CVE Published
  • 2024-03-30 EPSS Updated
  • 2024-08-03 CVE Updated
  • ---------- Exploited in Wild
  • ---------- KEV Due Date
  • ---------- First Exploit
CWE
  • CWE-294: Authentication Bypass by Capture-replay
CAPEC
Affected Vendors, Products, and Versions
Vendor Product Version Other Status
Vendor Product Version Other Status <-- --> Vendor Product Version Other Status
Kubevela
Search vendor "Kubevela"
Kubevela
Search vendor "Kubevela" for product "Kubevela"
>= 1.4.0 < 1.4.11
Search vendor "Kubevela" for product "Kubevela" and version " >= 1.4.0 < 1.4.11"
-
Affected
Kubevela
Search vendor "Kubevela"
Kubevela
Search vendor "Kubevela" for product "Kubevela"
>= 1.5.0 < 1.5.3
Search vendor "Kubevela" for product "Kubevela" and version " >= 1.5.0 < 1.5.3"
-
Affected