Vulnerability identifier: #VU97292
Vulnerability risk: Medium
CVSSv4.0: 2.7 [CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:N/SC:N/SI:N/SA:N/E:U/U:Green]
CVE-ID:
CWE-ID:
CWE-287
Exploitation vector: Network
Exploit availability: No
Vulnerable software:
forklift
Universal components / Libraries /
Software for developers
Vendor: KubeV2V
Description
The vulnerability allows a remote attacker to bypass authentication process.
The vulnerability exists due to the application does not actually verify if the supplied Bearer token is valid and grants access to the API. A remote attacker can send a simple valid HTTP request with any Bearer token and gain unauthorized access to the application.
Mitigation
Cybersecurity Help is currently unaware of any official solution to address this vulnerability.
Vulnerable software versions
forklift: 2.5.1 rc3 - 2.6.3 rc2
External links
https://access.redhat.com/security/cve/CVE-2024-8509
https://bugzilla.redhat.com/show_bug.cgi?id=2310406
https://access.redhat.com/errata/RHSA-2024:6487
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.