Executive Summary

Informations
Name CVE-2023-50248 First vendor Publication 2023-12-13
Vendor Cve Last vendor Modification 2023-12-18

Security-Database Scoring CVSS v3

Cvss vector : CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
Overall CVSS Score 6.5
Base Score 6.5 Environmental Score 6.5
impact SubScore 3.6 Temporal Score 6.5
Exploitabality Sub Score 2.8
 
Attack Vector Network Attack Complexity Low
Privileges Required Low User Interaction None
Scope Unchanged Confidentiality Impact None
Integrity Impact None Availability Impact High
Calculate full CVSS 3.0 Vectors scores

Security-Database Scoring CVSS v2

Cvss vector :
Cvss Base Score N/A Attack Range N/A
Cvss Impact Score N/A Attack Complexity N/A
Cvss Expoit Score N/A Authentication N/A
Calculate full CVSS 2.0 Vectors scores

Detail

CKAN is an open-source data management system for powering data hubs and data portals. Starting in version 2.0.0 and prior to versions 2.9.10 and 2.10.3, when submitting a POST request to the `/dataset/new` endpoint (including either the auth cookie or the `Authorization` header) with a specially-crafted field, an attacker can create an out-of-memory error in the hosting server. To trigger this error, the attacker need to have permissions to create or edit datasets. This vulnerability has been patched in CKAN 2.10.3 and 2.9.10.

Original Source

Url : http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-50248

CWE : Common Weakness Enumeration

% Id Name
100 % CWE-130 Improper Handling of Length Parameter Inconsistency

CPE : Common Platform Enumeration

TypeDescriptionCount
Application 2

Sources (Detail)

https://github.com/ckan/ckan/commit/bd02018b65c5b81d7ede195d00d0fcbac3aa33be
https://github.com/ckan/ckan/security/advisories/GHSA-7fgc-89cx-w8j5
Source Url

Alert History

If you want to see full details history, please login or register.
0
1
Date Informations
2023-12-21 21:27:51
  • Multiple Updates
2023-12-14 00:27:22
  • First insertion