CVE-2022-36089

Source
https://cve.org/CVERecord?id=CVE-2022-36089
Import Source
https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2022-36089.json
JSON Data
https://api.test.osv.dev/v1/vulns/CVE-2022-36089
Aliases
  • GHSA-cq42-w295-r29q
Published
2022-09-07T23:00:15Z
Modified
2026-02-15T03:09:14.303785Z
Severity
  • 8.2 (High) CVSS_V3 - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:H/A:N CVSS Calculator
Summary
VelaUX APIServer vulnerable to Authentication Bypass by Capture-replay
Details

KubeVela is an application delivery platform Users using KubeVela's VelaUX APIServer could be affected by an authentication bypass vulnerability. In KubeVela prior to versions 1.4.11 and 1.5.4, VelaUX APIServer uses the PlatformID as the signed key to generate the JWT tokens for users. Another API called getSystemInfo exposes the platformID. This vulnerability allows users to use the platformID to re-generate the JWT tokens to bypass the authentication. Versions 1.4.11 and 1.5.4 contain a patch for this issue.

Database specific
{
    "osv_generated_from": "https://github.com/CVEProject/cvelistV5/tree/main/cves/2022/36xxx/CVE-2022-36089.json",
    "cwe_ids": [
        "CWE-294"
    ],
    "cna_assigner": "GitHub_M"
}
References

Affected packages

Git / github.com/kubevela/kubevela

Affected ranges

Type
GIT
Repo
https://github.com/kubevela/kubevela
Events
Database specific
{
    "versions": [
        {
            "introduced": "1.4.0"
        },
        {
            "fixed": "1.4.11"
        }
    ]
}
Type
GIT
Repo
https://github.com/kubevela/kubevela
Events
Database specific
{
    "versions": [
        {
            "introduced": "1.5.0"
        },
        {
            "fixed": "1.5.3"
        }
    ]
}

Affected versions

v1.*
v1.4.0
v1.4.1
v1.4.10
v1.4.2
v1.4.3
v1.4.4
v1.4.5
v1.4.6
v1.4.7
v1.4.7-patch
v1.4.8
v1.4.9
v1.5.0
v1.5.2

Database specific

source
"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2022-36089.json"