CVE-2022-24721

Source
https://nvd.nist.gov/vuln/detail/CVE-2022-24721
Import Source
https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2022-24721.json
JSON Data
https://api.osv.dev/v1/vulns/CVE-2022-24721
Aliases
Published
2022-03-15T14:15:08Z
Modified
2024-05-30T03:34:57.548780Z
Severity
  • 8.1 (High) CVSS_V3 - CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N CVSS Calculator
Summary
[none]
Details

CometD is a scalable comet implementation for web messaging. In any version prior to 5.0.11, 6.0.6, and 7.0.6, internal usage of Oort and Seti channels is improperly authorized, so any remote user could subscribe and publish to those channels. By subscribing to those channels, a remote user may be able to watch cluster-internal traffic that contains other users' (possibly sensitive) data. By publishing to those channels, a remote user may be able to create/modify/delete other user's data and modify the cluster structure. A fix is available in versions 5.0.11, 6.0.6, and 7.0.6. As a workaround, install a custom SecurityPolicy that forbids subscription and publishing to remote, non-Oort, sessions on Oort and Seti channels.

References

Affected packages

Git / github.com/cometd/cometd

Affected ranges

Type
GIT
Repo
https://github.com/cometd/cometd
Events
Introduced
0 Unknown introduced commit / All previous commits are affected
Fixed

Affected versions

2.*

2.3.0
2.3.0.RC1
2.3.1
2.4.0
2.4.0.RC1
2.4.0.RC2
2.4.0.RC3
2.4.0.beta1
2.4.0.beta2
2.4.1
2.5.0
2.5.0-RC1
2.5.0-beta1
2.5.0-beta2
2.5.0-beta3
2.5.1
2.6.0
2.6.0-RC1
2.7.0
2.7.0-RC1
2.7.0-beta1
2.7.0-beta2
2.8.0
2.8.0-RC1
2.8.0-beta1
2.9.0
2.9.0-beta1
2.9.1

3.*

3.0.0
3.0.0.RC1
3.0.0.beta1
3.0.0.beta2
3.0.1
3.0.10
3.0.2
3.0.3
3.0.4
3.0.5
3.0.6
3.0.7
3.0.8
3.0.9
3.1.0
3.1.0-BETA0
3.1.0-BETA1
3.1.0-BETA2
3.1.0-RC0
3.1.0-RC1
3.1.1
3.1.10
3.1.11
3.1.12
3.1.13
3.1.14
3.1.2
3.1.2-BETA0
3.1.2-BETA1
3.1.2-RC0
3.1.3
3.1.4
3.1.5
3.1.6
3.1.7
3.1.8
3.1.9

4.*

4.0.0
4.0.0-BETA0
4.0.0-BETA1
4.0.1
4.0.2
4.0.3
4.0.4
4.0.5
4.0.6
4.0.7
4.0.8
4.0.9

5.*

5.0.0
5.0.0-BETA1
5.0.1
5.0.10
5.0.2
5.0.3
5.0.4
5.0.5
5.0.6
5.0.7
5.0.8
5.0.9