Show plain JSON{"containers": {"cna": {"affected": [{"product": "kubevela", "vendor": "kubevela", "versions": [{"status": "affected", "version": ">= 1.4.0, < 1.4.11"}, {"status": "affected", "version": ">= 1.5.0, < 1.5.3"}]}], "descriptions": [{"lang": "en", "value": "KubeVela is an application delivery platform Users using KubeVela's VelaUX APIServer could be affected by an authentication bypass vulnerability. In KubeVela prior to versions 1.4.11 and 1.5.4, VelaUX APIServer uses the `PlatformID` as the signed key to generate the JWT tokens for users. Another API called `getSystemInfo` exposes the platformID. This vulnerability allows users to use the platformID to re-generate the JWT tokens to bypass the authentication. Versions 1.4.11 and 1.5.4 contain a patch for this issue."}], "metrics": [{"cvssV3_1": {"attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 8.2, "baseSeverity": "HIGH", "confidentialityImpact": "LOW", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:H/A:N", "version": "3.1"}}], "problemTypes": [{"descriptions": [{"cweId": "CWE-294", "description": "CWE-294: Authentication Bypass by Capture-replay", "lang": "en", "type": "CWE"}]}], "providerMetadata": {"dateUpdated": "2022-09-07T23:00:15.000Z", "orgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "shortName": "GitHub_M"}, "references": [{"tags": ["x_refsource_CONFIRM"], "url": "https://github.com/kubevela/kubevela/security/advisories/GHSA-cq42-w295-r29q"}, {"tags": ["x_refsource_MISC"], "url": "https://github.com/kubevela/kubevela/pull/4634"}], "source": {"advisory": "GHSA-cq42-w295-r29q", "discovery": "UNKNOWN"}, "title": "VelaUX APIServer vulnerable to Authentication Bypass by Capture-replay", "x_legacyV4Record": {"CVE_data_meta": {"ASSIGNER": "security-advisories@github.com", "ID": "CVE-2022-36089", "STATE": "PUBLIC", "TITLE": "VelaUX APIServer vulnerable to Authentication Bypass by Capture-replay"}, "affects": {"vendor": {"vendor_data": [{"product": {"product_data": [{"product_name": "kubevela", "version": {"version_data": [{"version_value": ">= 1.4.0, < 1.4.11"}, {"version_value": ">= 1.5.0, < 1.5.3"}]}}]}, "vendor_name": "kubevela"}]}}, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": {"description_data": [{"lang": "eng", "value": "KubeVela is an application delivery platform Users using KubeVela's VelaUX APIServer could be affected by an authentication bypass vulnerability. In KubeVela prior to versions 1.4.11 and 1.5.4, VelaUX APIServer uses the `PlatformID` as the signed key to generate the JWT tokens for users. Another API called `getSystemInfo` exposes the platformID. This vulnerability allows users to use the platformID to re-generate the JWT tokens to bypass the authentication. Versions 1.4.11 and 1.5.4 contain a patch for this issue."}]}, "impact": {"cvss": {"attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 8.2, "baseSeverity": "HIGH", "confidentialityImpact": "LOW", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:H/A:N", "version": "3.1"}}, "problemtype": {"problemtype_data": [{"description": [{"lang": "eng", "value": "CWE-294: Authentication Bypass by Capture-replay"}]}]}, "references": {"reference_data": [{"name": "https://github.com/kubevela/kubevela/security/advisories/GHSA-cq42-w295-r29q", "refsource": "CONFIRM", "url": "https://github.com/kubevela/kubevela/security/advisories/GHSA-cq42-w295-r29q"}, {"name": "https://github.com/kubevela/kubevela/pull/4634", "refsource": "MISC", "url": "https://github.com/kubevela/kubevela/pull/4634"}]}, "source": {"advisory": "GHSA-cq42-w295-r29q", "discovery": "UNKNOWN"}}}, "adp": [{"providerMetadata": {"orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE", "dateUpdated": "2024-08-03T09:52:00.489Z"}, "title": "CVE Program Container", "references": [{"tags": ["x_refsource_CONFIRM", "x_transferred"], "url": "https://github.com/kubevela/kubevela/security/advisories/GHSA-cq42-w295-r29q"}, {"tags": ["x_refsource_MISC", "x_transferred"], "url": "https://github.com/kubevela/kubevela/pull/4634"}]}, {"metrics": [{"other": {"type": "ssvc", "content": {"timestamp": "2025-04-23T15:51:51.219428Z", "id": "CVE-2022-36089", "options": [{"Exploitation": "none"}, {"Automatable": "yes"}, {"Technical Impact": "partial"}], "role": "CISA Coordinator", "version": "2.0.3"}}}], "title": "CISA ADP Vulnrichment", "providerMetadata": {"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP", "dateUpdated": "2025-04-23T17:13:19.449Z"}}]}, "cveMetadata": {"assignerOrgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "assignerShortName": "GitHub_M", "cveId": "CVE-2022-36089", "datePublished": "2022-09-07T23:00:15.000Z", "dateReserved": "2022-07-15T00:00:00.000Z", "dateUpdated": "2025-04-23T17:13:19.449Z", "state": "PUBLISHED"}, "dataType": "CVE_RECORD", "dataVersion": "5.1"}