Apollo is a configuration management system. A vulnerability exists in the synchronization configuration feature that allows users to craft specific requests to bypass permission checks. This exploit enables them to modify a namespace without the necessary permissions. The issue was addressed with an input parameter check which was released in version 2.3.0.
{
"cwe_ids": [
"CWE-284"
]
}[
{
"signature_version": "v1",
"signature_type": "Line",
"target": {
"file": "apollo-portal/src/main/java/com/ctrip/framework/apollo/portal/entity/model/NamespaceSyncModel.java"
},
"digest": {
"threshold": 0.9,
"line_hashes": [
"252361781893128610831119860120716564120",
"241986941767300582401186021421404527590",
"267759248037966548381652108870486947456"
]
},
"deprecated": false,
"id": "CVE-2024-43397-51818ddb",
"source": "https://github.com/apolloconfig/apollo/commit/f55b419145bf9d4f2f51dd4cd45108229e8d97ed"
},
{
"signature_version": "v1",
"signature_type": "Function",
"target": {
"function": "update",
"file": "apollo-portal/src/main/java/com/ctrip/framework/apollo/portal/controller/ItemController.java"
},
"digest": {
"function_hash": "240805218289294193921827074991494796769",
"length": 823.0
},
"deprecated": false,
"id": "CVE-2024-43397-d9d24912",
"source": "https://github.com/apolloconfig/apollo/commit/f55b419145bf9d4f2f51dd4cd45108229e8d97ed"
},
{
"signature_version": "v1",
"signature_type": "Line",
"target": {
"file": "apollo-portal/src/main/java/com/ctrip/framework/apollo/portal/controller/ItemController.java"
},
"digest": {
"threshold": 0.9,
"line_hashes": [
"11016624441191631595763362316640120630",
"242111561994901883686430695799157596485",
"24152801020650701272081069733587756050",
"305294074042114408557474320716928347875"
]
},
"deprecated": false,
"id": "CVE-2024-43397-e57d8c43",
"source": "https://github.com/apolloconfig/apollo/commit/f55b419145bf9d4f2f51dd4cd45108229e8d97ed"
}
]