DIRAC is a distributed resource framework. In affected versions any user could get a token that has been requested by another user/agent. This may expose resources to unintended parties. This issue has been addressed in release version 8.0.37. Users are advised to upgrade. There are no known workarounds for this vulnerability.
References
| Link | Resource |
|---|---|
| https://github.com/DIRACGrid/DIRAC/commit/f9ddab755b9a69acb85e14d2db851d8ac0c9648c | Patch |
| https://github.com/DIRACGrid/DIRAC/security/advisories/GHSA-59qj-jcjv-662j | Third Party Advisory |
Configurations
History
16 Feb 2024, 21:37
| Type | Values Removed | Values Added |
|---|---|---|
| First Time |
Diracgrid dirac
Diracgrid |
|
| CVSS |
v2 : v3 : |
v2 : unknown
v3 : 7.5 |
| CPE | cpe:2.3:a:diracgrid:dirac:*:*:*:*:*:*:*:* | |
| Summary |
|
|
| References | () https://github.com/DIRACGrid/DIRAC/commit/f9ddab755b9a69acb85e14d2db851d8ac0c9648c - Patch | |
| References | () https://github.com/DIRACGrid/DIRAC/security/advisories/GHSA-59qj-jcjv-662j - Third Party Advisory |
09 Feb 2024, 00:15
| Type | Values Removed | Values Added |
|---|---|---|
| New CVE |
Information
Published : 2024-02-09 00:15
Updated : 2024-02-16 21:37
NVD link : CVE-2024-24825
Mitre link : CVE-2024-24825
CVE.ORG link : CVE-2024-24825
JSON object : View
Products Affected
diracgrid
- dirac
CWE
CWE-200
Exposure of Sensitive Information to an Unauthorized Actor
