跳转到帖子

Red Hat JBossEAP: Improper Access Control (CVE-2024-30261)

recommended_posts

发布于
  • Members

Red Hat JBossEAP: Improper Access Control (CVE-2024-30261)

Severity
2
CVSS
(AV:N/AC:H/Au:S/C:N/I:P/A:N)
Published
04/04/2024
Created
09/20/2024
Added
09/19/2024
Modified
12/20/2024

Description

Undici is an HTTP/1.1 client, written from scratch for Node.js. An attacker can alter the `integrity` option passed to `fetch()`, allowing `fetch()` to accept requests as valid even if they have been tampered. This vulnerability was patched in version(s) 5.28.4 and 6.11.1.. A flaw was found in the nodejs-undici package. This issue may allow an attacker to alter the integrity option passed to fetch(), allowing fetch() to accept requests as valid even if they have been tampered with.

Solution(s)

  • red-hat-jboss-eap-upgrade-latest

References

  • https://attackerkb.com/topics/cve-2024-30261
  • CVE - 2024-30261
  • https://access.redhat.com/security/cve/CVE-2024-30261
  • https://bugzilla.redhat.com/show_bug.cgi?id=2273519
  • 查看数 704
  • 已创建
  • 最后回复

参与讨论

你可立刻发布并稍后注册。 如果你有帐户,立刻登录发布帖子。
注意:你的帖子需要版主批准后才能看到。

游客
回帖…