Vulnerability identifier: #VU97950
Vulnerability risk: Medium
CVSSv4.0: 1.3 [CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:N/SC:N/SI:N/SA:N/E:U/U:Green]
CVE-ID: CVE-2024-47172
CWE-ID:
CWE-863
Exploitation vector: Network
Exploit availability: No
Vulnerable software:
Computer Vision Annotation Tool (CVAT)
Hardware solutions /
Firmware
Vendor: Intel
Description
The vulnerability allows a remote attacker to bypass authorization checks.
The vulnerability exists due to broken access control in several PATCH endpoints. A remote user can gain access to sensitive information or alter the default source and target storage associated with any project or task.
Mitigation
Install updates from vendor's website.
Vulnerable software versions
Computer Vision Annotation Tool (CVAT): 2.0.0 - 2.19.0
External links
https://github.com/cvat-ai/cvat/security/advisories/GHSA-gxhm-hg65-5gh2
https://github.com/cvat-ai/cvat/commit/59ce6ca784a0d426b2cfb8cf2850ba1d520c03f5
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote authenticated user via the Internet.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.