#VU97292 Improper authentication in forklift - CVE-2024-8509


Vulnerability identifier: #VU97292

Vulnerability risk: Medium

CVSSv4.0: 2.7 [CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:N/SC:N/SI:N/SA:N/E:U/U:Green]

CVE-ID: CVE-2024-8509

CWE-ID: CWE-287

Exploitation vector: Network

Exploit availability: No

Vulnerable software:
forklift
Universal components / Libraries / Software for developers

Vendor: KubeV2V

Description

The vulnerability allows a remote attacker to bypass authentication process.

The vulnerability exists due to the application does not actually verify if the supplied Bearer token is valid and grants access to the API. A remote attacker can send a simple valid HTTP request with any Bearer token and gain unauthorized access to the application.

Mitigation
Cybersecurity Help is currently unaware of any official solution to address this vulnerability.

Vulnerable software versions

forklift: 2.5.1 rc3 - 2.6.3 rc2


External links
https://access.redhat.com/security/cve/CVE-2024-8509
https://bugzilla.redhat.com/show_bug.cgi?id=2310406
https://access.redhat.com/errata/RHSA-2024:6487


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.


Latest bulletins with this vulnerability