Overview
- Description
- KubeVela is an application delivery platform Users using KubeVela's VelaUX APIServer could be affected by an authentication bypass vulnerability. In KubeVela prior to versions 1.4.11 and 1.5.4, VelaUX APIServer uses the `PlatformID` as the signed key to generate the JWT tokens for users. Another API called `getSystemInfo` exposes the platformID. This vulnerability allows users to use the platformID to re-generate the JWT tokens to bypass the authentication. Versions 1.4.11 and 1.5.4 contain a patch for this issue.
- Source
- security-advisories@github.com
- NVD status
- Analyzed
Risk scores
CVSS 3.1
- Type
- Primary
- Base score
- 9.8
- Impact score
- 5.9
- Exploitability score
- 3.9
- Vector string
- CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
- Severity
- CRITICAL
Weaknesses
- security-advisories@github.com
- CWE-294
Social media
- Hype score
- Not currently trending
Configurations
[ { "nodes": [ { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:a:kubevela:kubevela:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "C957D116-0D05-45E2-BB4F-521EE62DE92F", "versionEndExcluding": "1.4.11", "versionStartIncluding": "1.4.0" }, { "criteria": "cpe:2.3:a:kubevela:kubevela:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "1DAABE63-63A3-4146-B803-BB13F5CC93D2", "versionEndExcluding": "1.5.3", "versionStartIncluding": "1.5.0" } ], "operator": "OR" } ] } ]