Overview
- Description
- CKAN is an open-source data management system for powering data hubs and data portals. Starting in version 2.0.0 and prior to versions 2.9.10 and 2.10.3, when submitting a POST request to the `/dataset/new` endpoint (including either the auth cookie or the `Authorization` header) with a specially-crafted field, an attacker can create an out-of-memory error in the hosting server. To trigger this error, the attacker need to have permissions to create or edit datasets. This vulnerability has been patched in CKAN 2.10.3 and 2.9.10.
- Source
- security-advisories@github.com
- NVD status
- Analyzed
Risk scores
CVSS 3.1
- Type
- Primary
- Base score
- 6.5
- Impact score
- 3.6
- Exploitability score
- 2.8
- Vector string
- CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
- Severity
- MEDIUM
Weaknesses
- security-advisories@github.com
- CWE-130
Social media
- Hype score
- Not currently trending
Configurations
[ { "nodes": [ { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:a:okfn:ckan:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "3C332324-34D4-4EA8-B552-8EA55EFAA33B", "versionEndExcluding": "2.9.10", "versionStartIncluding": "2.0" }, { "criteria": "cpe:2.3:a:okfn:ckan:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "B48DC86C-262E-41F5-8BD9-44F664CE36D8", "versionEndExcluding": "2.10.3", "versionStartIncluding": "2.10.0" } ], "operator": "OR" } ] } ]